Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yVhGfho0R4.exe

Overview

General Information

Sample name:yVhGfho0R4.exe
renamed because original name is a hash value
Original sample name:6138a05e066e20c8e39c760bec68e113.exe
Analysis ID:1522425
MD5:6138a05e066e20c8e39c760bec68e113
SHA1:04644b6a5ea07a58824ff156b240ca9481806469
SHA256:b4463bc49e5f7fdfe610f17163ad8b399dda74e6843c4ea7fccf379c95e06e4f
Tags:exeRATRemcosRATuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • yVhGfho0R4.exe (PID: 1136 cmdline: "C:\Users\user\Desktop\yVhGfho0R4.exe" MD5: 6138A05E066E20C8E39C760BEC68E113)
    • MSBuild.exe (PID: 5460 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • MSBuild.exe (PID: 5164 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\ghpxetgawuzqhlhqyiosoy" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • MSBuild.exe (PID: 1076 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • MSBuild.exe (PID: 6112 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • MSBuild.exe (PID: 1900 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • MSBuild.exe (PID: 4296 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\aeiaxebwykjatxryydovbqttyepx" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "103.186.116.220:6565:0", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-9XV80Z", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4116138513.0000000000B37000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6c4b8:$a1: Remcos restarted by watchdog!
          • 0x6ca30:$a3: %02i:%02i:%02i:%03i
          Click to see the 19 entries
          SourceRuleDescriptionAuthorStrings
          2.2.MSBuild.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            2.2.MSBuild.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              2.2.MSBuild.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                2.2.MSBuild.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x6aab8:$a1: Remcos restarted by watchdog!
                • 0x6b030:$a3: %02i:%02i:%02i:%03i
                2.2.MSBuild.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
                • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x64b7c:$str_b2: Executing file:
                • 0x65bfc:$str_b3: GetDirectListeningPort
                • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x65728:$str_b7: \update.vbs
                • 0x64ba4:$str_b9: Downloaded file:
                • 0x64b90:$str_b10: Downloading file:
                • 0x64c34:$str_b12: Failed to upload file:
                • 0x65bc4:$str_b13: StartForward
                • 0x65be4:$str_b14: StopForward
                • 0x65680:$str_b15: fso.DeleteFile "
                • 0x65614:$str_b16: On Error Resume Next
                • 0x656b0:$str_b17: fso.DeleteFolder "
                • 0x64c24:$str_b18: Uploaded file:
                • 0x64be4:$str_b19: Unable to delete:
                • 0x65648:$str_b20: while fso.FileExists("
                • 0x650c1:$str_c0: [Firefox StoredLogins not found]
                Click to see the 29 entries

                System Summary

                barindex
                Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 178.237.33.50, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 5460, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49735

                Stealing of Sensitive Information

                barindex
                Source: Registry Key setAuthor: Joe Security: Data: Details: 0D 41 61 46 3D CC 79 C3 F3 C4 AD EC EF AA FD 8B BE 09 2A B6 AA 42 5A B9 A0 43 ED B1 0F 17 9A 98 5A F4 01 D0 98 38 0A B4 B3 57 6E 12 EE C3 93 6C 19 4E 11 AD 68 49 77 90 3A 57 69 9C 4E 9A F2 2F DB FC 56 F1 0C E2 1D AC 99 88 9A 16 78 59 1D 14 85 74 4E D5 0C 82 A8 A6 73 23 4C A9 34 33 1E 66 1A 77 26 C7 8C A1 45 B2 9B D4 BE 22 F7 D9 CB 55 22 E1 ED E0 , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, ProcessId: 5460, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-9XV80Z\exepath
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-30T02:41:56.258638+020020327761Malware Command and Control Activity Detected192.168.2.449732103.186.116.2206565TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-30T02:41:57.164033+020020327771Malware Command and Control Activity Detected103.186.116.2206565192.168.2.449732TCP
                2024-09-30T02:44:25.301352+020020327771Malware Command and Control Activity Detected103.186.116.2206565192.168.2.449732TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-30T02:41:58.136829+020028033043Unknown Traffic192.168.2.449735178.237.33.5080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: yVhGfho0R4.exeAvira: detected
                Source: 00000002.00000002.4116138513.0000000000B37000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "103.186.116.220:6565:0", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-9XV80Z", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: yVhGfho0R4.exeReversingLabs: Detection: 73%
                Source: yVhGfho0R4.exeVirustotal: Detection: 70%Perma Link
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4116138513.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: yVhGfho0R4.exe PID: 1136, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5460, type: MEMORYSTR
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: yVhGfho0R4.exeJoe Sandbox ML: detected
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,2_2_004338C8
                Source: yVhGfho0R4.exe, 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_7a23d1cc-c

                Exploits

                barindex
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: yVhGfho0R4.exe PID: 1136, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5460, type: MEMORYSTR

                Privilege Escalation

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00407538 _wcslen,CoGetObject,2_2_00407538
                Source: yVhGfho0R4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: yVhGfho0R4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_0040928E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,2_2_0041C322
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,2_2_0040C388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_004096A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,2_2_00408847
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00407877 FindFirstFileW,FindNextFileW,2_2_00407877
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040BB6B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00419B86
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040BD72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_100010F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0040AE51 FindFirstFileW,FindNextFileW,3_2_0040AE51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407EF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00407CD2
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeCode function: 4x nop then jmp 07624E93h0_2_07624529

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49732 -> 103.186.116.220:6565
                Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 103.186.116.220:6565 -> 192.168.2.4:49732
                Source: Malware configuration extractorURLs: 103.186.116.220
                Source: global trafficTCP traffic: 192.168.2.4:49732 -> 103.186.116.220:6565
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: AARNET-AS-APAustralianAcademicandResearchNetworkAARNe AARNET-AS-APAustralianAcademicandResearchNetworkAARNe
                Source: Joe Sandbox ViewASN Name: ATOM86-ASATOM86NL ATOM86-ASATOM86NL
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49735 -> 178.237.33.50:80
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.116.220
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,2_2_0041B411
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                Source: MSBuild.exe, MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                Source: MSBuild.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: bhv28F9.tmp.3.drString found in binary or memory: pop-lva1.www.linkedin.com equals www.linkedin.com (Linkedin)
                Source: bhv28F9.tmp.3.drString found in binary or memory: pop-lva1.www.linkedin.com0 equals www.linkedin.com (Linkedin)
                Source: MSBuild.exe, 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                Source: MSBuild.exe, 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                Source: MSBuild.exe, MSBuild.exe, 00000002.00000002.4116233872.0000000000B8F000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4116138513.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4116233872.0000000000B6C000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4116233872.0000000000B95000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: yVhGfho0R4.exe, 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, yVhGfho0R4.exe, 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: MSBuild.exe, 00000002.00000002.4116233872.0000000000B8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                Source: MSBuild.exe, 00000002.00000002.4116233872.0000000000B6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpXp
                Source: MSBuild.exe, 00000002.00000002.4116233872.0000000000B6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gplgqL3)
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0:
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0H
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0I
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0Q
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://ocsp.msocsp.com0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://ocsp.msocsp.com0S
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://ocspx.digicert.com0E
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0~
                Source: MSBuild.exe, MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: MSBuild.exe, MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                Source: MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                Source: MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: bhv28F9.tmp.3.drString found in binary or memory: http://www.msftconnecttest.com/connecttest.txt?n=1696334965379
                Source: MSBuild.exe, 00000003.00000002.1710827612.00000000012F3000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                Source: MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpX
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-afd-nocache-ccp.azureedge.net/apc/trans.gif?99bdaa7641aea1439604d0afe8971477
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-afd-nocache-ccp.azureedge.net/apc/trans.gif?bc7d158a1b0c0bcddb88a222b6122bda
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?4be9f57fdbd89d63c136fa90032d1d91
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-vp-nocache.azureedge.net/apc/trans.gif?e5772e13592c9d33c9159aed24f891a7
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?a6aceac28fb5ae421a73cab7cdd76bd8
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?b57fe5cd49060a950d25a1d237496815
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?2f6c563d6db8702d4f61cfc28e14d6ba
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?3dacce210479f0b4d47ed33c21160712
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?7e0e9c3a9f02f17275e789accf11532b
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-vs-nocache.azureedge.net/apc/trans.gif?81f59f7d566abbd2077a5b6cdfd04c7b
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?3c5bdbf226e2549812723f51b8fe2023
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?c50299ad5b45bb3d4c7a57024998a291
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
                Source: MSBuild.exeString found in binary or memory: https://login.yahoo.com/config/login
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_sKiljltKC1Ne_Y3fl1HuHQ2.css
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_BxKM4IRLudkIao5qo
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_AI1nyU_u3YQ_at1fSBm4Uw2.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://maps.windows.com/windows-app-web-link
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=27ff908e89d7b6264fde
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=586ba6
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=7ccb04
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=b1ed69
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-0debb885be07c402c948.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ec3581b6c9e6e9985aa7.chunk.v7.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.6c288f9aff9797959103.chunk.v7.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.9ba2d4c9e339ba497e10.chunk.v7.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-1652fd8b358d589e6ec0.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.52c45571d19ede0a7005.chunk.v7.j
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.d918c7fc33e22b41b936.chunk.v7.c
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://www.digicert.com/CPS0
                Source: MSBuild.exe, MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: MSBuild.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                Source: bhv28F9.tmp.3.drString found in binary or memory: https://www.office.com/
                Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000002_2_0040A2F3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,2_2_0040B749
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_004168FC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,3_2_0040987A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,3_2_004098E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,6_2_00406DFC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,6_2_00406E9F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,7_2_004068B5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,7_2_004072B5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,2_2_0040B749
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,2_2_0040A41B
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: yVhGfho0R4.exe PID: 1136, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5460, type: MEMORYSTR

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4116138513.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: yVhGfho0R4.exe PID: 1136, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5460, type: MEMORYSTR

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041CA6D SystemParametersInfoW,2_2_0041CA6D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041CA73 SystemParametersInfoW,2_2_0041CA73

                System Summary

                barindex
                Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.yVhGfho0R4.exe.4a6ad30.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.yVhGfho0R4.exe.4a6ad30.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.yVhGfho0R4.exe.402f758.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.yVhGfho0R4.exe.402f758.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: yVhGfho0R4.exe PID: 1136, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: MSBuild.exe PID: 5460, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,2_2_0041812A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,2_2_0041330D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,2_2_0041BBC6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,2_2_0041BB9A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00401806 NtdllDefWindowProc_W,3_2_00401806
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004018C0 NtdllDefWindowProc_W,3_2_004018C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_004016FD NtdllDefWindowProc_A,6_2_004016FD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_004017B7 NtdllDefWindowProc_A,6_2_004017B7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00402CAC NtdllDefWindowProc_A,7_2_00402CAC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00402D66 NtdllDefWindowProc_A,7_2_00402D66
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,2_2_004167EF
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeCode function: 0_2_0174DA4C0_2_0174DA4C
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeCode function: 0_2_07626D880_2_07626D88
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeCode function: 0_2_076204780_2_07620478
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeCode function: 0_2_076223F80_2_076223F8
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeCode function: 0_2_076229080_2_07622908
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeCode function: 0_2_076200400_2_07620040
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeCode function: 0_2_076200060_2_07620006
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeCode function: 0_2_076208B00_2_076208B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043706A2_2_0043706A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004140052_2_00414005
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043E11C2_2_0043E11C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004541D92_2_004541D9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004381E82_2_004381E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041F18B2_2_0041F18B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004462702_2_00446270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043E34B2_2_0043E34B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004533AB2_2_004533AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0042742E2_2_0042742E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004375662_2_00437566
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043E5A82_2_0043E5A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004387F02_2_004387F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043797E2_2_0043797E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004339D72_2_004339D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044DA492_2_0044DA49
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00427AD72_2_00427AD7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041DBF32_2_0041DBF3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00427C402_2_00427C40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00437DB32_2_00437DB3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00435EEB2_2_00435EEB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043DEED2_2_0043DEED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00426E9F2_2_00426E9F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_100171942_2_10017194
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_1000B5C12_2_1000B5C1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044B0403_2_0044B040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0043610D3_2_0043610D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004473103_2_00447310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044A4903_2_0044A490
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0040755A3_2_0040755A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0043C5603_2_0043C560
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044B6103_2_0044B610
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044D6C03_2_0044D6C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004476F03_2_004476F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044B8703_2_0044B870
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044081D3_2_0044081D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004149573_2_00414957
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004079EE3_2_004079EE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00407AEB3_2_00407AEB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044AA803_2_0044AA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00412AA93_2_00412AA9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00404B743_2_00404B74
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00404B033_2_00404B03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044BBD83_2_0044BBD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00404BE53_2_00404BE5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00404C763_2_00404C76
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00415CFE3_2_00415CFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00416D723_2_00416D72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00446D303_2_00446D30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00446D8B3_2_00446D8B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00406E8F3_2_00406E8F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_004050386_2_00405038
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0041208C6_2_0041208C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_004050A96_2_004050A9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0040511A6_2_0040511A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0043C13A6_2_0043C13A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_004051AB6_2_004051AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_004493006_2_00449300
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0040D3226_2_0040D322
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0044A4F06_2_0044A4F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0043A5AB6_2_0043A5AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_004136316_2_00413631
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_004466906_2_00446690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0044A7306_2_0044A730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_004398D86_2_004398D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_004498E06_2_004498E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0044A8866_2_0044A886
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0043DA096_2_0043DA09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_00438D5E6_2_00438D5E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_00449ED06_2_00449ED0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0041FE836_2_0041FE83
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_00430F546_2_00430F54
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004050C27_2_004050C2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004014AB7_2_004014AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004051337_2_00405133
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004051A47_2_004051A4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004012467_2_00401246
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_0040CA467_2_0040CA46
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004052357_2_00405235
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004032C87_2_004032C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004016897_2_00401689
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00402F607_2_00402F60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 004169A7 appears 87 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 004165FF appears 35 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00434801 appears 41 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00422297 appears 42 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00434E70 appears 54 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00402093 appears 50 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 0044DB70 appears 41 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00401E65 appears 35 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00444B5A appears 37 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00413025 appears 79 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00416760 appears 69 times
                Source: yVhGfho0R4.exe, 00000000.00000002.1676305648.0000000008040000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs yVhGfho0R4.exe
                Source: yVhGfho0R4.exe, 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs yVhGfho0R4.exe
                Source: yVhGfho0R4.exe, 00000000.00000002.1667841439.00000000012BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs yVhGfho0R4.exe
                Source: yVhGfho0R4.exe, 00000000.00000002.1671150412.0000000002F61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs yVhGfho0R4.exe
                Source: yVhGfho0R4.exe, 00000000.00000000.1650050849.0000000000C42000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametmgz.exe0 vs yVhGfho0R4.exe
                Source: yVhGfho0R4.exeBinary or memory string: OriginalFilenametmgz.exe0 vs yVhGfho0R4.exe
                Source: yVhGfho0R4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.yVhGfho0R4.exe.4a6ad30.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.yVhGfho0R4.exe.4a6ad30.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.yVhGfho0R4.exe.402f758.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.yVhGfho0R4.exe.402f758.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: yVhGfho0R4.exe PID: 1136, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: MSBuild.exe PID: 5460, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: yVhGfho0R4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, cfn9r5bGAAffGKfp6R.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, cfn9r5bGAAffGKfp6R.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, cfn9r5bGAAffGKfp6R.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, ugpo9CZbaeLfV3myxU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, ugpo9CZbaeLfV3myxU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, cfn9r5bGAAffGKfp6R.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, cfn9r5bGAAffGKfp6R.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, cfn9r5bGAAffGKfp6R.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winEXE@13/4@1/2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,3_2_004182CE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,2_2_0041798D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,7_2_00410DE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,3_2_00418758
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,2_2_0040F4AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,2_2_0041B539
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_0041AADB
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\yVhGfho0R4.exe.logJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-9XV80Z
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMutant created: NULL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Local\Temp\bhv28F9.tmpJump to behavior
                Source: yVhGfho0R4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: yVhGfho0R4.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSystem information queried: HandleInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: MSBuild.exe, MSBuild.exe, 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: MSBuild.exe, MSBuild.exe, 00000006.00000002.1703882442.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: MSBuild.exe, 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                Source: MSBuild.exe, MSBuild.exe, 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: MSBuild.exe, MSBuild.exe, 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: MSBuild.exe, MSBuild.exe, 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: MSBuild.exe, 00000003.00000002.1711863242.000000000358A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: MSBuild.exe, MSBuild.exe, 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: yVhGfho0R4.exeReversingLabs: Detection: 73%
                Source: yVhGfho0R4.exeVirustotal: Detection: 70%
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                Source: unknownProcess created: C:\Users\user\Desktop\yVhGfho0R4.exe "C:\Users\user\Desktop\yVhGfho0R4.exe"
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\ghpxetgawuzqhlhqyiosoy"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\aeiaxebwykjatxryydovbqttyepx"
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\ghpxetgawuzqhlhqyiosoy"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\aeiaxebwykjatxryydovbqttyepx"Jump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: yVhGfho0R4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: yVhGfho0R4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: yVhGfho0R4.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                Source: 0.2.yVhGfho0R4.exe.2f9f04c.3.raw.unpack, JK.cs.Net Code: ve System.Reflection.Assembly.Load(byte[])
                Source: 0.2.yVhGfho0R4.exe.8030000.7.raw.unpack, JK.cs.Net Code: ve System.Reflection.Assembly.Load(byte[])
                Source: 0.2.yVhGfho0R4.exe.2f95a34.2.raw.unpack, JK.cs.Net Code: ve System.Reflection.Assembly.Load(byte[])
                Source: 0.2.yVhGfho0R4.exe.2fefab8.0.raw.unpack, JK.cs.Net Code: ve System.Reflection.Assembly.Load(byte[])
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, cfn9r5bGAAffGKfp6R.cs.Net Code: udfwJWZx3LhcUyqB0oy System.Reflection.Assembly.Load(byte[])
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, cfn9r5bGAAffGKfp6R.cs.Net Code: udfwJWZx3LhcUyqB0oy System.Reflection.Assembly.Load(byte[])
                Source: 0.2.yVhGfho0R4.exe.2fe64a0.1.raw.unpack, JK.cs.Net Code: ve System.Reflection.Assembly.Load(byte[])
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041CBE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00457186 push ecx; ret 2_2_00457199
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041C7F3 push eax; retf 2_2_0041C7FD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00457AA8 push eax; ret 2_2_00457AC6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00434EB6 push ecx; ret 2_2_00434EC9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_10002806 push ecx; ret 2_2_10002819
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_10009FD8 push esi; ret 2_2_10009FD9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044693D push ecx; ret 3_2_0044694D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044DB70 push eax; ret 3_2_0044DB84
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0044DB70 push eax; ret 3_2_0044DBAC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00451D54 push eax; ret 3_2_00451D61
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0044B090 push eax; ret 6_2_0044B0A4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_0044B090 push eax; ret 6_2_0044B0CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_00444E71 push ecx; ret 6_2_00444E81
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00414060 push eax; ret 7_2_00414074
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00414060 push eax; ret 7_2_0041409C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00414039 push ecx; ret 7_2_00414049
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_004164EB push 0000006Ah; retf 7_2_004165C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00416553 push 0000006Ah; retf 7_2_004165C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00416555 push 0000006Ah; retf 7_2_004165C4
                Source: yVhGfho0R4.exeStatic PE information: section name: .text entropy: 7.921981970269015
                Source: 0.2.yVhGfho0R4.exe.2f9f04c.3.raw.unpack, JK.csHigh entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq'
                Source: 0.2.yVhGfho0R4.exe.8030000.7.raw.unpack, JK.csHigh entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq'
                Source: 0.2.yVhGfho0R4.exe.2f95a34.2.raw.unpack, JK.csHigh entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq'
                Source: 0.2.yVhGfho0R4.exe.2fefab8.0.raw.unpack, JK.csHigh entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, GyKpQSgf5HpsmsUlPA.csHigh entropy of concatenated method names: 'Cj6L8Q3NU6', 'iYNLNdmT9j', 'xFxL3V5cw1', 'kZi3wWYEyC', 'OHt3zGf4nd', 'sjdLow9tWZ', 'ifhLlrGUAf', 'R0aL9wMV6R', 'sPcLEHU1Ax', 's9xLGhbDD9'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, CSBuLhBVLDAjCN4ab5g.csHigh entropy of concatenated method names: 'bPGbBBXnZa', 'rkRbIhlrqX', 'QUsbRUIk1A', 'n4woJgCwGywIWi7pK3F', 'Qyl9lhCXAKRae6TFHbO', 's8rDswCuJKuhmvTHDOP', 'm2XgceCkaNNYUWEuVrf'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, FJZ3b1SNPk6AH9S3dN.csHigh entropy of concatenated method names: 'Um2aTT0N0C', 'fJAaC5xhku', 'P8Wamg3mUW', 'zgmajR4Zsl', 'S4ka5PxcsS', 'iiTaYsibnq', 'gwLafsbZ1w', 'KYYaZGBEg7', 'UNyav3MmNb', 'P9WaspTvTQ'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, DUQKPABGQTiZjmVW3Ds.csHigh entropy of concatenated method names: 'EOBkBr7DH1', 'g4nkIN3iUa', 'sbKkRkUdes', 'y0GkU9O2oW', 'gU2kt9vQdC', 'b2ekqdZrk5', 'jQKk0LGBME', 'd6LkiLSnhe', 'yY5kcYFIqU', 'GLLkrS4bfZ'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, wKd8uvkfeK9g3pq4p1.csHigh entropy of concatenated method names: 'llLutik4Wx', 'OW4u0I9A4Q', 'FQ1NYW233o', 'mTsNfpCUte', 'lAENZWISp2', 'TweNvMfS9Z', 'YhiNskGBle', 'EQ8NStYCe9', 'joON2r7VHd', 'k4ONTJhYrR'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, NcMAdkBBLdEFlMCBYD8.csHigh entropy of concatenated method names: 'ToString', 'y86bEMutEm', 'nv1bG4Cdom', 'nZMb1Jtcr1', 'S6Yb8Jx0gR', 'bdObpv9HNh', 'O6fbNynOme', 'fwEbuw0TsU', 'dVOXLWCxqVwRaDVt772', 'YKOZi1CML4eFlV6YURG'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, PJbD695ql9dDdyvvQu.csHigh entropy of concatenated method names: 'Nncgigj7ED', 'YTKgcrAUpr', 'AvNgDlxDij', 'nwEg5lTO2q', 'UNfgff7ME4', 'nB4gZTX2UF', 'qsVgsrjoDs', 'FIagSVAYNn', 'ix8gTbju2r', 'jD1gepe3Lt'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, SCKMKaurLawxFASS3u.csHigh entropy of concatenated method names: 'OXrlLQsdrj', 'xpWlQdJXFX', 'IQMlJ4y9ZZ', 'iQpl7KFqBZ', 'CsblaH13Z3', 'ymNlApSFqy', 'NCCmsv3YKedpUHPNTW', 'Fu72X99frcBxVtVolt', 't4sllcsMxt', 'iHUlEhXMZ4'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, jclHo295LGwkCFJ1iQ.csHigh entropy of concatenated method names: 'RivhJOjYIn', 'J2Oh7SGnpQ', 'ToString', 'EQEh8rtYWi', 'Ic7hp3QGgy', 'arNhNV9eqd', 'IKyhuXE4Po', 'hE9h3MmsC5', 'N65hL8lK6E', 'DhghQxIokW'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, dQphx0KM5v8onkuqkp.csHigh entropy of concatenated method names: 'Yiw6Deant5', 'hLD65Bwcha', 'S6v6YER83Z', 'CXU6fHE05p', 'utX6muCRf4', 'dcy6ZEuESA', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, TArJOaIk4d0URIMIy6.csHigh entropy of concatenated method names: 'Dispose', 'lCvl4GGU9n', 'ldE95GFl87', 'KWJnnQ4gaR', 'JsplwmmLRH', 'MrmlzswCsw', 'ProcessDialogKey', 'P639oAQ71N', 'F2e9lYrq90', 'bhm99S6xns'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, TjpaYF0VITZIM9Q90n.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'XC994qdXXw', 'dH49wgFTXk', 'Eyl9zxMakd', 'honEocrjxt', 'U38ElXpgi3', 'GDHE9qoJ7i', 'WNWEEHBvAA', 'XcAlIYZ2XWFqKbs7hsL'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, cfn9r5bGAAffGKfp6R.csHigh entropy of concatenated method names: 'RTDE1fHmQk', 'JleE8KgBRY', 'k0MEpdVG5g', 'GgDENS9Gx7', 'GRxEudk8wu', 'hykE3VOCZk', 'x6FELklxcX', 'pAfEQ0Ykd8', 'JYGExZddHh', 'uTGEJt535c'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, ywwX8iBr85a4aWjnGN3.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'd9pbmUTsqc', 'm8ebjUHiXZ', 'p1QbFEFGuP', 'YwYbXjmqF2', 'slobW4FRcP', 'Ye7bKuyV0o', 'gnZbPpwnRy'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, CWRgr1zmyaQStQfcMl.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fSPkgYRLqF', 'zyqka1SayH', 'TpckAQMyvY', 'EaCkhbiS76', 'qObk6t4yZQ', 'yuVkkSYo7C', 'EXgkbhg27N'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, tdATvp364BTp5AICRm.csHigh entropy of concatenated method names: 'jGR68JdoUv', 'GGx6pAclj9', 'nMu6Np5alL', 'wAA6uSEO06', 'dcb63lJmR6', 'sQJ6Luuvee', 'mNg6QEBo48', 'qSL6x0MZKN', 'vFa6J2rD0r', 'Cvd679gKhx'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, uEgj1ieYR1weieEfWe.csHigh entropy of concatenated method names: 'ToString', 'UaHAe200nm', 'NWXA5ne7I4', 'bACAYfDTox', 'UjEAfHJ5Rt', 'vhaAZFv3xO', 'rJDAvLsJid', 'wUbAsWIvXp', 'I32ASydZEr', 'BwaA29rMfV'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, pl13NdVRjJO1tNFxll.csHigh entropy of concatenated method names: 'rH4R887Fn', 'yJUUtYZha', 'bvVqPXH6l', 'bYe0rFiww', 'EBJcQC9ju', 'm0urYCJNk', 'OwfVdvughG0hbcU7v9', 'WwE6Rxkrgw9tN6u986', 'v2c6mns9F', 'RlEbNNHbS'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, JPjyXi7q9SPaUpSjxn.csHigh entropy of concatenated method names: 'TVTNUZUYbq', 'sHkNqxOVN8', 'ocoNihhXW3', 'DSrNchQWGi', 'fiONanm3aK', 'hirNApdHjo', 'vp4Nhi4w3w', 'MMuN680LwT', 'RtENkWfsCK', 'rNPNbtVFe6'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, pVbapSx54UjSprPYgy.csHigh entropy of concatenated method names: 'cVBLBQdCRF', 'XhRLInTrpQ', 'DUBLRK2HaC', 'hdkLU7M75v', 'n3CLtg2mud', 'E3bLqHDxqg', 'gu9L0TVVcZ', 'Pe0LienWEU', 'Bp4LcQACxy', 'oTYLrZIm3t'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, FTgOyqMnXdqCEgAQLJ.csHigh entropy of concatenated method names: 'onI31dv87b', 'jVw3pWW93l', 'vOj3u7DZ31', 'KTl3L11Yf2', 'tVJ3QcJRBq', 'E2uuWdAVwe', 'fuJuK4rNTc', 'Lv9uP9w8pw', 'a6puMApcrW', 'W2Pu4p9UeV'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, E6A5VbQslqReY7pRM8.csHigh entropy of concatenated method names: 'Q9XhMN5otB', 'rwQhwXIbmm', 'pcp6o57LKv', 'Ek86lHaEAu', 'QuKheMME12', 'w9jhCRGkxx', 'W0BhOWZu2l', 'XoehmXFSYM', 'XKshj9Qb4P', 'vXihF4MS53'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, ugpo9CZbaeLfV3myxU.csHigh entropy of concatenated method names: 'uRQpmusxCq', 'UxPpjGWbWx', 'ppKpFQ58g5', 'm5GpXWZsoj', 'vWRpWpBfKO', 'shipKUYrkJ', 'qsspPgR5AD', 'XnmpMoZb82', 'XY4p41LYq0', 'vEUpw1mW6V'
                Source: 0.2.yVhGfho0R4.exe.8040000.8.raw.unpack, qZTxkTTvlwJBanUwkg.csHigh entropy of concatenated method names: 'y9AklBe4kR', 'HshkEdQBhL', 'HaUkGMME1O', 'auBk8qSF3p', 'N7qkpAoLBn', 'MuAkuAVivS', 'q0pk3HA0a9', 'R6U6Pbq0tu', 'uyy6MKM1V3', 'KGJ64Qi4ix'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, GyKpQSgf5HpsmsUlPA.csHigh entropy of concatenated method names: 'Cj6L8Q3NU6', 'iYNLNdmT9j', 'xFxL3V5cw1', 'kZi3wWYEyC', 'OHt3zGf4nd', 'sjdLow9tWZ', 'ifhLlrGUAf', 'R0aL9wMV6R', 'sPcLEHU1Ax', 's9xLGhbDD9'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, CSBuLhBVLDAjCN4ab5g.csHigh entropy of concatenated method names: 'bPGbBBXnZa', 'rkRbIhlrqX', 'QUsbRUIk1A', 'n4woJgCwGywIWi7pK3F', 'Qyl9lhCXAKRae6TFHbO', 's8rDswCuJKuhmvTHDOP', 'm2XgceCkaNNYUWEuVrf'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, FJZ3b1SNPk6AH9S3dN.csHigh entropy of concatenated method names: 'Um2aTT0N0C', 'fJAaC5xhku', 'P8Wamg3mUW', 'zgmajR4Zsl', 'S4ka5PxcsS', 'iiTaYsibnq', 'gwLafsbZ1w', 'KYYaZGBEg7', 'UNyav3MmNb', 'P9WaspTvTQ'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, DUQKPABGQTiZjmVW3Ds.csHigh entropy of concatenated method names: 'EOBkBr7DH1', 'g4nkIN3iUa', 'sbKkRkUdes', 'y0GkU9O2oW', 'gU2kt9vQdC', 'b2ekqdZrk5', 'jQKk0LGBME', 'd6LkiLSnhe', 'yY5kcYFIqU', 'GLLkrS4bfZ'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, wKd8uvkfeK9g3pq4p1.csHigh entropy of concatenated method names: 'llLutik4Wx', 'OW4u0I9A4Q', 'FQ1NYW233o', 'mTsNfpCUte', 'lAENZWISp2', 'TweNvMfS9Z', 'YhiNskGBle', 'EQ8NStYCe9', 'joON2r7VHd', 'k4ONTJhYrR'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, NcMAdkBBLdEFlMCBYD8.csHigh entropy of concatenated method names: 'ToString', 'y86bEMutEm', 'nv1bG4Cdom', 'nZMb1Jtcr1', 'S6Yb8Jx0gR', 'bdObpv9HNh', 'O6fbNynOme', 'fwEbuw0TsU', 'dVOXLWCxqVwRaDVt772', 'YKOZi1CML4eFlV6YURG'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, PJbD695ql9dDdyvvQu.csHigh entropy of concatenated method names: 'Nncgigj7ED', 'YTKgcrAUpr', 'AvNgDlxDij', 'nwEg5lTO2q', 'UNfgff7ME4', 'nB4gZTX2UF', 'qsVgsrjoDs', 'FIagSVAYNn', 'ix8gTbju2r', 'jD1gepe3Lt'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, SCKMKaurLawxFASS3u.csHigh entropy of concatenated method names: 'OXrlLQsdrj', 'xpWlQdJXFX', 'IQMlJ4y9ZZ', 'iQpl7KFqBZ', 'CsblaH13Z3', 'ymNlApSFqy', 'NCCmsv3YKedpUHPNTW', 'Fu72X99frcBxVtVolt', 't4sllcsMxt', 'iHUlEhXMZ4'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, jclHo295LGwkCFJ1iQ.csHigh entropy of concatenated method names: 'RivhJOjYIn', 'J2Oh7SGnpQ', 'ToString', 'EQEh8rtYWi', 'Ic7hp3QGgy', 'arNhNV9eqd', 'IKyhuXE4Po', 'hE9h3MmsC5', 'N65hL8lK6E', 'DhghQxIokW'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, dQphx0KM5v8onkuqkp.csHigh entropy of concatenated method names: 'Yiw6Deant5', 'hLD65Bwcha', 'S6v6YER83Z', 'CXU6fHE05p', 'utX6muCRf4', 'dcy6ZEuESA', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, TArJOaIk4d0URIMIy6.csHigh entropy of concatenated method names: 'Dispose', 'lCvl4GGU9n', 'ldE95GFl87', 'KWJnnQ4gaR', 'JsplwmmLRH', 'MrmlzswCsw', 'ProcessDialogKey', 'P639oAQ71N', 'F2e9lYrq90', 'bhm99S6xns'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, TjpaYF0VITZIM9Q90n.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'XC994qdXXw', 'dH49wgFTXk', 'Eyl9zxMakd', 'honEocrjxt', 'U38ElXpgi3', 'GDHE9qoJ7i', 'WNWEEHBvAA', 'XcAlIYZ2XWFqKbs7hsL'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, cfn9r5bGAAffGKfp6R.csHigh entropy of concatenated method names: 'RTDE1fHmQk', 'JleE8KgBRY', 'k0MEpdVG5g', 'GgDENS9Gx7', 'GRxEudk8wu', 'hykE3VOCZk', 'x6FELklxcX', 'pAfEQ0Ykd8', 'JYGExZddHh', 'uTGEJt535c'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, ywwX8iBr85a4aWjnGN3.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'd9pbmUTsqc', 'm8ebjUHiXZ', 'p1QbFEFGuP', 'YwYbXjmqF2', 'slobW4FRcP', 'Ye7bKuyV0o', 'gnZbPpwnRy'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, CWRgr1zmyaQStQfcMl.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fSPkgYRLqF', 'zyqka1SayH', 'TpckAQMyvY', 'EaCkhbiS76', 'qObk6t4yZQ', 'yuVkkSYo7C', 'EXgkbhg27N'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, tdATvp364BTp5AICRm.csHigh entropy of concatenated method names: 'jGR68JdoUv', 'GGx6pAclj9', 'nMu6Np5alL', 'wAA6uSEO06', 'dcb63lJmR6', 'sQJ6Luuvee', 'mNg6QEBo48', 'qSL6x0MZKN', 'vFa6J2rD0r', 'Cvd679gKhx'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, uEgj1ieYR1weieEfWe.csHigh entropy of concatenated method names: 'ToString', 'UaHAe200nm', 'NWXA5ne7I4', 'bACAYfDTox', 'UjEAfHJ5Rt', 'vhaAZFv3xO', 'rJDAvLsJid', 'wUbAsWIvXp', 'I32ASydZEr', 'BwaA29rMfV'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, pl13NdVRjJO1tNFxll.csHigh entropy of concatenated method names: 'rH4R887Fn', 'yJUUtYZha', 'bvVqPXH6l', 'bYe0rFiww', 'EBJcQC9ju', 'm0urYCJNk', 'OwfVdvughG0hbcU7v9', 'WwE6Rxkrgw9tN6u986', 'v2c6mns9F', 'RlEbNNHbS'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, JPjyXi7q9SPaUpSjxn.csHigh entropy of concatenated method names: 'TVTNUZUYbq', 'sHkNqxOVN8', 'ocoNihhXW3', 'DSrNchQWGi', 'fiONanm3aK', 'hirNApdHjo', 'vp4Nhi4w3w', 'MMuN680LwT', 'RtENkWfsCK', 'rNPNbtVFe6'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, pVbapSx54UjSprPYgy.csHigh entropy of concatenated method names: 'cVBLBQdCRF', 'XhRLInTrpQ', 'DUBLRK2HaC', 'hdkLU7M75v', 'n3CLtg2mud', 'E3bLqHDxqg', 'gu9L0TVVcZ', 'Pe0LienWEU', 'Bp4LcQACxy', 'oTYLrZIm3t'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, FTgOyqMnXdqCEgAQLJ.csHigh entropy of concatenated method names: 'onI31dv87b', 'jVw3pWW93l', 'vOj3u7DZ31', 'KTl3L11Yf2', 'tVJ3QcJRBq', 'E2uuWdAVwe', 'fuJuK4rNTc', 'Lv9uP9w8pw', 'a6puMApcrW', 'W2Pu4p9UeV'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, E6A5VbQslqReY7pRM8.csHigh entropy of concatenated method names: 'Q9XhMN5otB', 'rwQhwXIbmm', 'pcp6o57LKv', 'Ek86lHaEAu', 'QuKheMME12', 'w9jhCRGkxx', 'W0BhOWZu2l', 'XoehmXFSYM', 'XKshj9Qb4P', 'vXihF4MS53'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, ugpo9CZbaeLfV3myxU.csHigh entropy of concatenated method names: 'uRQpmusxCq', 'UxPpjGWbWx', 'ppKpFQ58g5', 'm5GpXWZsoj', 'vWRpWpBfKO', 'shipKUYrkJ', 'qsspPgR5AD', 'XnmpMoZb82', 'XY4p41LYq0', 'vEUpw1mW6V'
                Source: 0.2.yVhGfho0R4.exe.40e9978.6.raw.unpack, qZTxkTTvlwJBanUwkg.csHigh entropy of concatenated method names: 'y9AklBe4kR', 'HshkEdQBhL', 'HaUkGMME1O', 'auBk8qSF3p', 'N7qkpAoLBn', 'MuAkuAVivS', 'q0pk3HA0a9', 'R6U6Pbq0tu', 'uyy6MKM1V3', 'KGJ64Qi4ix'
                Source: 0.2.yVhGfho0R4.exe.2fe64a0.1.raw.unpack, JK.csHigh entropy of concatenated method names: 'JK', 'Y3', 'Lv', 'F5', 'q9', 'Ou', 'NL', 'tg', 'Jy', 'kq'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00406EEB ShellExecuteW,URLDownloadToFileW,2_2_00406EEB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_0041AADB

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (132).png
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041CBE1
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040F7E2 Sleep,ExitProcess,2_2_0040F7E2
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory allocated: 1740000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory allocated: 2D70000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory allocated: 8200000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory allocated: 9200000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory allocated: 93C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory allocated: A3C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,2_2_0041A7D9
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 5857Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 4132Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI coverage: 9.4 %
                Source: C:\Users\user\Desktop\yVhGfho0R4.exe TID: 1076Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4312Thread sleep count: 5857 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4312Thread sleep time: -17571000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4312Thread sleep count: 4132 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 4312Thread sleep time: -12396000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_0040928E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,2_2_0041C322
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,2_2_0040C388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_004096A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,2_2_00408847
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00407877 FindFirstFileW,FindNextFileW,2_2_00407877
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040BB6B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00419B86
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040BD72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,2_2_100010F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0040AE51 FindFirstFileW,FindNextFileW,3_2_0040AE51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 6_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,6_2_00407EF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 7_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407898
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00407CD2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00418981 memset,GetSystemInfo,3_2_00418981
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: MSBuild.exe, 00000002.00000002.4116138513.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4116233872.0000000000BB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: bhv28F9.tmp.3.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                Source: bhv28F9.tmp.3.drBinary or memory string: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpXOaQeBtbq%2B7LgJauNdx5lF%2FQ%2FOy2qwXRNGjU%3D&Manufacturer=VMware%2C%20Inc.&Model=VMware20%2C1&Language=en&Locale=en-US
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI call chain: ExitProcess graph end nodegraph_2-54406
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00434A8A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,3_2_0040DD85
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041CBE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00443355 mov eax, dword ptr fs:[00000030h]2_2_00443355
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_10004AB4 mov eax, dword ptr fs:[00000030h]2_2_10004AB4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00411D39 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,2_2_00411D39
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0043503C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00434A8A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0043BB71
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00434BD8 SetUnhandledExceptionFilter,2_2_00434BD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_100060E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_10002639
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_10002B1C
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,2_2_0041812A
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 401000Jump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 459000Jump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 471000Jump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 477000Jump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 478000Jump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 479000Jump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 47E000Jump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 758008Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe2_2_00412132
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00419662 mouse_event,2_2_00419662
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\ghpxetgawuzqhlhqyiosoy"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\aeiaxebwykjatxryydovbqttyepx"Jump to behavior
                Source: MSBuild.exe, 00000002.00000002.4116233872.0000000000B8F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerDB52
                Source: MSBuild.exe, 00000002.00000002.4116233872.0000000000B8F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagermB
                Source: MSBuild.exe, 00000002.00000002.4116233872.0000000000B8F000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4116138513.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4116233872.0000000000B6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00434CB6 cpuid 2_2_00434CB6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoA,2_2_0040F90C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: EnumSystemLocalesW,2_2_0045201B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: EnumSystemLocalesW,2_2_004520B6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_00452143
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,2_2_00452393
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: EnumSystemLocalesW,2_2_00448484
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_004524BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,2_2_004525C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00452690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,2_2_0044896D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,2_2_00451D58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: EnumSystemLocalesW,2_2_00451FD0
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Users\user\Desktop\yVhGfho0R4.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00404F51 GetLocalTime,CreateEventA,CreateThread,2_2_00404F51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0041B69E GetComputerNameExW,GetUserNameW,2_2_0041B69E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0044942D _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,2_2_0044942D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041739B GetVersionExW,3_2_0041739B
                Source: C:\Users\user\Desktop\yVhGfho0R4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4116138513.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: yVhGfho0R4.exe PID: 1136, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5460, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data2_2_0040BA4D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\2_2_0040BB6B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: \key3.db2_2_0040BB6B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: ESMTPPassword6_2_004033F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword6_2_00402DB3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword6_2_00402DB3
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5164, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-9XV80ZJump to behavior
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.4a6ad30.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.yVhGfho0R4.exe.402f758.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4116138513.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: yVhGfho0R4.exe PID: 1136, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 5460, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: cmd.exe2_2_0040569A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                12
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts12
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Bypass User Account Control
                1
                Deobfuscate/Decode Files or Information
                111
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                22
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts2
                Service Execution
                Logon Script (Windows)1
                Access Token Manipulation
                4
                Obfuscated Files or Information
                2
                Credentials in Registry
                1
                System Service Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                Windows Service
                12
                Software Packing
                3
                Credentials In Files
                3
                File and Directory Discovery
                Distributed Component Object Model111
                Input Capture
                1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script522
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets38
                System Information Discovery
                SSH3
                Clipboard Data
                2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Bypass User Account Control
                Cached Domain Credentials31
                Security Software Discovery
                VNCGUI Input Capture13
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                Masquerading
                DCSync31
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                Virtualization/Sandbox Evasion
                Proc Filesystem4
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron522
                Process Injection
                Network Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1522425 Sample: yVhGfho0R4.exe Startdate: 30/09/2024 Architecture: WINDOWS Score: 100 27 geoplugin.net 2->27 29 fp2e7a.wpc.phicdn.net 2->29 31 2 other IPs or domains 2->31 43 Suricata IDS alerts for network traffic 2->43 45 Found malware configuration 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 12 other signatures 2->49 8 yVhGfho0R4.exe 3 2->8         started        signatures3 process4 file5 25 C:\Users\user\AppData\...\yVhGfho0R4.exe.log, ASCII 8->25 dropped 51 Writes to foreign memory regions 8->51 53 Allocates memory in foreign processes 8->53 55 Injects a PE file into a foreign processes 8->55 12 MSBuild.exe 3 13 8->12         started        signatures6 process7 dnsIp8 33 geoplugin.net 178.237.33.50, 49735, 80 ATOM86-ASATOM86NL Netherlands 12->33 35 103.186.116.220, 49732, 49734, 6565 AARNET-AS-APAustralianAcademicandResearchNetworkAARNe unknown 12->35 57 Contains functionality to bypass UAC (CMSTPLUA) 12->57 59 Detected Remcos RAT 12->59 61 Tries to steal Mail credentials (via file registry) 12->61 63 7 other signatures 12->63 16 MSBuild.exe 1 12->16         started        19 MSBuild.exe 1 12->19         started        21 MSBuild.exe 2 12->21         started        23 2 other processes 12->23 signatures9 process10 signatures11 37 Tries to steal Instant Messenger accounts or passwords 16->37 39 Tries to steal Mail credentials (via file / registry access) 16->39 41 Tries to harvest and steal browser information (history, passwords, etc) 19->41

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                yVhGfho0R4.exe74%ReversingLabsByteCode-MSIL.Trojan.MassLogger
                yVhGfho0R4.exe71%VirustotalBrowse
                yVhGfho0R4.exe100%AviraHEUR/AGEN.1308647
                yVhGfho0R4.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                bg.microsoft.map.fastly.net0%VirustotalBrowse
                geoplugin.net0%VirustotalBrowse
                fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.fontbureau.com/designersG0%URL Reputationsafe
                http://www.fontbureau.com/designers/?0%URL Reputationsafe
                http://www.fontbureau.com/designers/?0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.fontbureau.com/designers?0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.fontbureau.com/designers0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://geoplugin.net/json.gp/C0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.fonts.com0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://www.fontbureau.com0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.fontbureau.com/designers80%URL Reputationsafe
                https://aefd.nelreports.net/api/report?cat=bingth0%VirustotalBrowse
                http://www.nirsoft.net0%VirustotalBrowse
                103.186.116.2202%VirustotalBrowse
                https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr0%VirustotalBrowse
                https://www.google.com0%VirustotalBrowse
                https://aefd.nelreports.net/api/report?cat=bingaotak0%VirustotalBrowse
                https://deff.nelreports.net/api/report?cat=msn0%VirustotalBrowse
                https://maps.windows.com/windows-app-web-link0%VirustotalBrowse
                https://login.yahoo.com/config/login0%VirustotalBrowse
                https://www.office.com/0%VirustotalBrowse
                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg0%VirustotalBrowse
                http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
                http://www.nirsoft.net/0%VirustotalBrowse
                https://aefd.nelreports.net/api/report?cat=wsb0%VirustotalBrowse
                http://www.imvu.com0%VirustotalBrowse
                http://geoplugin.net/json.gpSystem321%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.214.172
                truefalseunknown
                geoplugin.net
                178.237.33.50
                truetrueunknown
                fp2e7a.wpc.phicdn.net
                192.229.221.95
                truefalseunknown
                NameMaliciousAntivirus DetectionReputation
                103.186.116.220trueunknown
                http://geoplugin.net/json.gptrue
                • URL Reputation: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.fontbureau.com/designersGyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.imvu.comrMSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                  unknown
                  http://www.fontbureau.com/designers/?yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.founder.com.cn/cn/bTheyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=Wbhv28F9.tmp.3.drfalse
                    unknown
                    https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbadbhv28F9.tmp.3.drfalse
                      unknown
                      http://www.fontbureau.com/designers?yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://aefd.nelreports.net/api/report?cat=bingthbhv28F9.tmp.3.drfalseunknown
                      https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fccbhv28F9.tmp.3.drfalse
                        unknown
                        http://www.tiro.comyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.nirsoft.netMSBuild.exe, 00000003.00000002.1710827612.00000000012F3000.00000004.00000010.00020000.00000000.sdmpfalseunknown
                        https://aefd.nelreports.net/api/report?cat=bingaotakbhv28F9.tmp.3.drfalseunknown
                        https://deff.nelreports.net/api/report?cat=msnbhv28F9.tmp.3.drfalseunknown
                        https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Frbhv28F9.tmp.3.drfalse
                          unknown
                          http://www.goodfont.co.kryVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742bhv28F9.tmp.3.drfalse
                            unknown
                            https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Frbhv28F9.tmp.3.drfalseunknown
                            http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comMSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                              unknown
                              https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51bhv28F9.tmp.3.drfalse
                                unknown
                                http://www.sajatypeworks.comyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.google.comMSBuild.exe, MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                http://www.founder.com.cn/cn/cTheyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950cbhv28F9.tmp.3.drfalse
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://geoplugin.net/json.gp/CyVhGfho0R4.exe, 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, yVhGfho0R4.exe, 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://geoplugin.net/json.gplgqL3)MSBuild.exe, 00000002.00000002.4116233872.0000000000B6C000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://maps.windows.com/windows-app-web-linkbhv28F9.tmp.3.drfalseunknown
                                    https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhv28F9.tmp.3.drfalse
                                      unknown
                                      http://www.galapagosdesign.com/DPleaseyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8bhv28F9.tmp.3.drfalse
                                        unknown
                                        https://login.yahoo.com/config/loginMSBuild.exefalseunknown
                                        http://www.fonts.comyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sandoll.co.kryVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deDPleaseyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.nirsoft.net/MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                        http://www.zhongyicts.com.cnyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sakkal.comyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816dbhv28F9.tmp.3.drfalse
                                          unknown
                                          https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367dbhv28F9.tmp.3.drfalse
                                            unknown
                                            https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svgbhv28F9.tmp.3.drfalseunknown
                                            https://www.office.com/bhv28F9.tmp.3.drfalseunknown
                                            http://www.apache.org/licenses/LICENSE-2.0yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                            http://www.fontbureau.comyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8bhv28F9.tmp.3.drfalse
                                              unknown
                                              https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68bhv28F9.tmp.3.drfalse
                                                unknown
                                                https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2bhv28F9.tmp.3.drfalse
                                                  unknown
                                                  https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8dbhv28F9.tmp.3.drfalse
                                                    unknown
                                                    https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437bhv28F9.tmp.3.drfalse
                                                      unknown
                                                      http://www.imvu.comMSBuild.exe, MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                                      https://aefd.nelreports.net/api/report?cat=wsbbhv28F9.tmp.3.drfalseunknown
                                                      https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326bhv28F9.tmp.3.drfalse
                                                        unknown
                                                        http://geoplugin.net/json.gpSystem32MSBuild.exe, 00000002.00000002.4116233872.0000000000B8F000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                                        http://www.carterandcone.comlyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03bhv28F9.tmp.3.drfalse
                                                          unknown
                                                          http://www.fontbureau.com/designers/cabarga.htmlNyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.founder.com.cn/cnyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.fontbureau.com/designers/frere-user.htmlyVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://aefd.nelreports.net/api/report?cat=bingaotbhv28F9.tmp.3.drfalse
                                                            unknown
                                                            https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-aebhv28F9.tmp.3.drfalse
                                                              unknown
                                                              https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7bhv28F9.tmp.3.drfalse
                                                                unknown
                                                                http://www.jiyu-kobo.co.jp/yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.fontbureau.com/designers8yVhGfho0R4.exe, 00000000.00000002.1675467612.00000000070B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFDbhv28F9.tmp.3.drfalse
                                                                  unknown
                                                                  https://aefd.nelreports.net/api/report?cat=bingrmsbhv28F9.tmp.3.drfalse
                                                                    unknown
                                                                    https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993bhv28F9.tmp.3.drfalse
                                                                      unknown
                                                                      https://www.google.com/accounts/serviceloginMSBuild.exefalse
                                                                        unknown
                                                                        https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5bhv28F9.tmp.3.drfalse
                                                                          unknown
                                                                          https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3bhv28F9.tmp.3.drfalse
                                                                            unknown
                                                                            https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135bhv28F9.tmp.3.drfalse
                                                                              unknown
                                                                              https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59bhv28F9.tmp.3.drfalse
                                                                                unknown
                                                                                http://www.ebuddy.comMSBuild.exe, MSBuild.exe, 00000007.00000002.1703993527.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  103.186.116.220
                                                                                  unknownunknown
                                                                                  7575AARNET-AS-APAustralianAcademicandResearchNetworkAARNetrue
                                                                                  178.237.33.50
                                                                                  geoplugin.netNetherlands
                                                                                  8455ATOM86-ASATOM86NLtrue
                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                  Analysis ID:1522425
                                                                                  Start date and time:2024-09-30 02:41:05 +02:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 8m 30s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Number of analysed new started processes analysed:12
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:yVhGfho0R4.exe
                                                                                  renamed because original name is a hash value
                                                                                  Original Sample Name:6138a05e066e20c8e39c760bec68e113.exe
                                                                                  Detection:MAL
                                                                                  Classification:mal100.rans.phis.troj.spyw.expl.evad.winEXE@13/4@1/2
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 99%
                                                                                  • Number of executed functions: 153
                                                                                  • Number of non-executed functions: 341
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .exe
                                                                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 184.28.90.27, 13.85.23.86, 199.232.214.172, 192.229.221.95, 13.95.31.18, 40.69.42.241
                                                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                  TimeTypeDescription
                                                                                  20:41:55API Interceptor1x Sleep call for process: yVhGfho0R4.exe modified
                                                                                  20:42:31API Interceptor5282814x Sleep call for process: MSBuild.exe modified
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  178.237.33.50C6DAEyTs7d.rtfGet hashmaliciousRemcosBrowse
                                                                                  • geoplugin.net/json.gp
                                                                                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.26006.17204.rtfGet hashmaliciousRemcosBrowse
                                                                                  • geoplugin.net/json.gp
                                                                                  dvswiftsend_240917122612_9331095243.docx.docGet hashmaliciousRemcosBrowse
                                                                                  • geoplugin.net/json.gp
                                                                                  oi2BC6zhUY.exeGet hashmaliciousRemcosBrowse
                                                                                  • geoplugin.net/json.gp
                                                                                  Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  • geoplugin.net/json.gp
                                                                                  Nutzen_Unterschrift_Planen#2024.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  • geoplugin.net/json.gp
                                                                                  SERVICE OR PRODUCT DESRIPTION AND COMPANY PROFILE.SCR.exeGet hashmaliciousRemcosBrowse
                                                                                  • geoplugin.net/json.gp
                                                                                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.31506.1346.rtfGet hashmaliciousRemcosBrowse
                                                                                  • geoplugin.net/json.gp
                                                                                  SecuriteInfo.com.Win32.Evo-gen.3521.549.exeGet hashmaliciousRemcosBrowse
                                                                                  • geoplugin.net/json.gp
                                                                                  sostener.vbsGet hashmaliciousRemcosBrowse
                                                                                  • geoplugin.net/json.gp
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  fp2e7a.wpc.phicdn.nethttps://polidos.com/Get hashmaliciousUnknownBrowse
                                                                                  • 192.229.221.95
                                                                                  https://pokerfanboy.com/Get hashmaliciousUnknownBrowse
                                                                                  • 192.229.221.95
                                                                                  https://polap77.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                  • 192.229.221.95
                                                                                  https://pokegamaclub.com/Get hashmaliciousUnknownBrowse
                                                                                  • 192.229.221.95
                                                                                  https://okfun188.com/Get hashmaliciousUnknownBrowse
                                                                                  • 192.229.221.95
                                                                                  https://ole798.com/Get hashmaliciousUnknownBrowse
                                                                                  • 192.229.221.95
                                                                                  https://mukirecords.com/Get hashmaliciousUnknownBrowse
                                                                                  • 192.229.221.95
                                                                                  https://budivenut.com/bAGMhBTY81DQ0DRMJ1XOQUUSFVUf9ARgYwDOI1O1UxFG8AJXEwDbZRAlQiDHcDIShTNa4gYPQjUu8AKO81BRGet hashmaliciousUnknownBrowse
                                                                                  • 192.229.221.95
                                                                                  https://www.marketbeat.com/articles/music-streaming-site-spotify-temporarily-goes-down-2024-09-29/?utm_source=newsletter&utm_medium=email&utm_campaign=newsletterclick&source=ARNDaily&AccountID=13091940&hash=99E2922EEB6FEC86743F5DB2C0E84BA5899D68F68F1472F885291F590EAD713452D3376C362A15DEDE29DFC4761637FD6FDD698F31176C60366847F610D6C32CGet hashmaliciousUnknownBrowse
                                                                                  • 192.229.221.95
                                                                                  SecuriteInfo.com.Win32.Malware-gen.28628.3533.exeGet hashmaliciousUnknownBrowse
                                                                                  • 192.229.221.95
                                                                                  geoplugin.netC6DAEyTs7d.rtfGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.26006.17204.rtfGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  dvswiftsend_240917122612_9331095243.docx.docGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  oi2BC6zhUY.exeGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  • 178.237.33.50
                                                                                  Nutzen_Unterschrift_Planen#2024.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  • 178.237.33.50
                                                                                  SERVICE OR PRODUCT DESRIPTION AND COMPANY PROFILE.SCR.exeGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.31506.1346.rtfGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  SecuriteInfo.com.Win32.Evo-gen.3521.549.exeGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  sostener.vbsGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  bg.microsoft.map.fastly.nethttps://pokerfanboy.com/Get hashmaliciousUnknownBrowse
                                                                                  • 199.232.210.172
                                                                                  https://polap77.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                  • 199.232.214.172
                                                                                  https://pokegamaclub.com/Get hashmaliciousUnknownBrowse
                                                                                  • 199.232.214.172
                                                                                  Transmission Cost Database 2.0.xlsbGet hashmaliciousUnknownBrowse
                                                                                  • 199.232.214.172
                                                                                  https://okfun188.com/Get hashmaliciousUnknownBrowse
                                                                                  • 199.232.214.172
                                                                                  https://mukirecords.com/Get hashmaliciousUnknownBrowse
                                                                                  • 199.232.214.172
                                                                                  https://budivenut.com/bAGMhBTY81DQ0DRMJ1XOQUUSFVUf9ARgYwDOI1O1UxFG8AJXEwDbZRAlQiDHcDIShTNa4gYPQjUu8AKO81BRGet hashmaliciousUnknownBrowse
                                                                                  • 199.232.214.172
                                                                                  file.exeGet hashmaliciousPureCrypterBrowse
                                                                                  • 199.232.214.172
                                                                                  https://thepursuitco.net/Get hashmaliciousUnknownBrowse
                                                                                  • 199.232.210.172
                                                                                  https://ebookkeepers.com.pk/Get hashmaliciousUnknownBrowse
                                                                                  • 199.232.214.172
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  ATOM86-ASATOM86NLC6DAEyTs7d.rtfGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.26006.17204.rtfGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  dvswiftsend_240917122612_9331095243.docx.docGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  oi2BC6zhUY.exeGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  Payment_Volksbank_EUR36550-Bestellung -4500673541.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  • 178.237.33.50
                                                                                  Nutzen_Unterschrift_Planen#2024.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                  • 178.237.33.50
                                                                                  SERVICE OR PRODUCT DESRIPTION AND COMPANY PROFILE.SCR.exeGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.31506.1346.rtfGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  SecuriteInfo.com.Win32.Evo-gen.3521.549.exeGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  sostener.vbsGet hashmaliciousRemcosBrowse
                                                                                  • 178.237.33.50
                                                                                  AARNET-AS-APAustralianAcademicandResearchNetworkAARNehttp://tkshopjp.top/Get hashmaliciousUnknownBrowse
                                                                                  • 103.176.91.125
                                                                                  Callus+1(814)-310-9943.pdfGet hashmaliciousPayPal PhisherBrowse
                                                                                  • 103.163.152.75
                                                                                  http://activa1dina.w3spaces.com/Get hashmaliciousUnknownBrowse
                                                                                  • 103.67.200.72
                                                                                  Quote.exeGet hashmaliciousRemcosBrowse
                                                                                  • 103.186.117.77
                                                                                  https://counsellingbyanika.com/m/?c3Y9bzM2NV8xX25vbSZyYW5kPVprRkZWV3c9JnVpZD1VU0VSMjMwOTIwMjRVNTAwOTIzMjU===Get hashmaliciousUnknownBrowse
                                                                                  • 103.171.180.10
                                                                                  https://iyary.lat/Get hashmaliciousUnknownBrowse
                                                                                  • 103.165.81.46
                                                                                  SecuriteInfo.com.Win32.PWSX-gen.9317.6656.exeGet hashmaliciousRemcosBrowse
                                                                                  • 103.186.116.145
                                                                                  rsJtZBgpwG.elfGet hashmaliciousMiraiBrowse
                                                                                  • 103.128.198.80
                                                                                  https://dweb.link/ipfs/QmesssDqFnCTLy37t8Srcq12Tjchz4atRzkxjV2QTjw1sp/Get hashmaliciousUnknownBrowse
                                                                                  • 103.180.114.1
                                                                                  http://alicona.tbfs-industerial.com/auth/activeyg/3mail@b.cGet hashmaliciousUnknownBrowse
                                                                                  • 103.191.241.218
                                                                                  No context
                                                                                  No context
                                                                                  Process:C:\Users\user\Desktop\yVhGfho0R4.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):1216
                                                                                  Entropy (8bit):5.34331486778365
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                  Malicious:true
                                                                                  Reputation:high, very likely benign file
                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  File Type:JSON data
                                                                                  Category:dropped
                                                                                  Size (bytes):962
                                                                                  Entropy (8bit):5.012309356796613
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:tklu+mnd66GkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qlu+KdbauKyGX85jvXhNlT3/7AcV9Wro
                                                                                  MD5:14B479958E659C5A4480548A393022AC
                                                                                  SHA1:CD0766C1DAB80656D469ABDB22917BE668622015
                                                                                  SHA-256:0F92BDD807D2F5C9947E1775A20231233043C171F62E1AFA705A7E7938909BFE
                                                                                  SHA-512:4E87CA47392DD9710F9E3D4A2124A34B41938986A4F43D50A48623DB1838C0D6CFF05FD2A23792DCD5A974A94416C97DC04ECEF85025FC785F3393B69A0B1DC5
                                                                                  Malicious:false
                                                                                  Reputation:moderate, very likely benign file
                                                                                  Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"0ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0xc7dcb1fc, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                  Category:dropped
                                                                                  Size (bytes):20447232
                                                                                  Entropy (8bit):1.283022653220528
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:JRSPOhijljKhBfvKDv2Q+555ckQB8WBbXnE:2ii9PD7+
                                                                                  MD5:A56570486551D694E0288B295B8D290B
                                                                                  SHA1:A131C3BD213F4A23722E4EB8F89418C77460E76E
                                                                                  SHA-256:8913B6F5FD5BE049AA1B62BC7C018FD6DE32EDCEF800D54A528E1B40A4F6BC62
                                                                                  SHA-512:BB8BD2CFAA69B69FC4B687303E371DC04E78B2153E6CA4469D917D27D579327611BB04044431F9CC180B729CB6870EC28398AF1871B562DA645CDE9A332DA2C9
                                                                                  Malicious:false
                                                                                  Preview:...... ........=......J}...0...{........................"..........{.......{..h.$..........................3.s.0...{..............................................................................................c...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{;.................................;.,......{...................N+W.....{...........................#......h.$.....................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):2
                                                                                  Entropy (8bit):1.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Qn:Qn
                                                                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                  Malicious:false
                                                                                  Preview:..
                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Entropy (8bit):7.778141698418682
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                  File name:yVhGfho0R4.exe
                                                                                  File size:987'136 bytes
                                                                                  MD5:6138a05e066e20c8e39c760bec68e113
                                                                                  SHA1:04644b6a5ea07a58824ff156b240ca9481806469
                                                                                  SHA256:b4463bc49e5f7fdfe610f17163ad8b399dda74e6843c4ea7fccf379c95e06e4f
                                                                                  SHA512:811381b33c3be3ee817a127c42e3c886802331d7453230658244872c97cddc36aa4c0b7d05e30c9280bfe1f800fedb481575cd0ab502386953af4505a5dd7aaf
                                                                                  SSDEEP:24576:LI++Z/jfG+Nv4GhFASI4tKX2Fjpm87bb:LI++ZLfG+SGhF/tImT
                                                                                  TLSH:792512E0A116DE8ACC664BF10962D2B017724EDD9841F50B6AEA3EFF77773012441B6B
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...V..f..............0.................. ... ....@.. .......................`............@................................
                                                                                  Icon Hash:0fd88dc89ea7861b
                                                                                  Entrypoint:0x4e1c96
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x66F4C956 [Thu Sep 26 02:39:18 2024 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                  Instruction
                                                                                  jmp dword ptr [00402000h]
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe1c440x4f.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe20000x10c58.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xf40000xc.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x20000xdfc9c0xdfe00d2e04de2efc3edf5383cba8c507e339eFalse0.9406265267308767data7.921981970269015IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0xe20000x10c580x10e0008175969d0c670a0f4fadf90f3b93938False0.14856770833333333data3.8696144954332015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0xf40000xc0x2009e85ce7337de870ef06ec70cecad2806False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_ICON0xe21180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/m0.14468236129184905
                                                                                  RT_GROUP_ICON0xf29400x14data1.0
                                                                                  RT_GROUP_ICON0xf29540x14data1.05
                                                                                  RT_VERSION0xf29680x2f0SysEx File - IDP0.4454787234042553
                                                                                  DLLImport
                                                                                  mscoree.dll_CorExeMain
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-09-30T02:41:56.258638+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.449732103.186.116.2206565TCP
                                                                                  2024-09-30T02:41:57.164033+02002032777ET MALWARE Remcos 3.x Unencrypted Server Response1103.186.116.2206565192.168.2.449732TCP
                                                                                  2024-09-30T02:41:58.136829+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449735178.237.33.5080TCP
                                                                                  2024-09-30T02:44:25.301352+02002032777ET MALWARE Remcos 3.x Unencrypted Server Response1103.186.116.2206565192.168.2.449732TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Sep 30, 2024 02:41:56.250865936 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:56.255907059 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:56.255991936 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:56.258637905 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:56.263407946 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:57.164032936 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:57.165282965 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:57.170063972 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:57.435775995 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:57.437653065 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:57.442516088 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:57.442608118 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:57.442656040 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:57.447406054 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:57.483954906 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:57.499269009 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:41:57.504101992 CEST8049735178.237.33.50192.168.2.4
                                                                                  Sep 30, 2024 02:41:57.504173040 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:41:57.504410028 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:41:57.509154081 CEST8049735178.237.33.50192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.136635065 CEST8049735178.237.33.50192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.136828899 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:41:58.144844055 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.149662971 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344084978 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344105005 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344115019 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344126940 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344136953 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344149113 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344177008 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.344216108 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344227076 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344238043 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344230890 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.344271898 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.344280958 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.344316959 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.349248886 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.349334002 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.349384069 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.573512077 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.573523998 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.573534966 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.573615074 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.573615074 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.573631048 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.573642969 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.573657036 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.573668957 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.573681116 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.574373960 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.574431896 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.574435949 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.574446917 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.574489117 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.574491978 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.574502945 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.574556112 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.575282097 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.575299978 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.575309038 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.575336933 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.575340986 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.575347900 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.575397015 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.576076031 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.576127052 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.576153994 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.576164961 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.576189995 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.576200962 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.576205015 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.576251984 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.578485012 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.624567986 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.802732944 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.802802086 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.802812099 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.802822113 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.802833080 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.802845001 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.802858114 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.802870035 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.802927971 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.803311110 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803329945 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803342104 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803358078 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.803402901 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.803412914 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803423882 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803483009 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.803831100 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803864956 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803875923 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803910017 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.803950071 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803961039 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803972960 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.803999901 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.804028988 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.804506063 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.804554939 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.804565907 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.804600000 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.804613113 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.804629087 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.804640055 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.804651976 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.804655075 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.804677963 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.804728031 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.804781914 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.805474997 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.805493116 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.805502892 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.805536032 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.805615902 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.805625916 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.805635929 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.805646896 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.805663109 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.805670977 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:58.805680990 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:58.805727005 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.030828953 CEST49675443192.168.2.4173.222.162.32
                                                                                  Sep 30, 2024 02:41:59.032813072 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.032835007 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.032845974 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.032870054 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.032898903 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.032929897 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.032933950 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.032953024 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.032993078 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.033000946 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033051968 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033063889 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033092976 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.033112049 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033123970 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033154011 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.033332109 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033380985 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.033385992 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033400059 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033438921 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.033444881 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033499956 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033510923 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033556938 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.033823967 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033833981 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033844948 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033869028 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.033896923 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.033898115 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033910036 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.033971071 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.034141064 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034171104 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034182072 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034213066 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.034281969 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034293890 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034307957 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034327984 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.034356117 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.034435987 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034447908 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034457922 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034476042 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034482002 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.034487009 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034498930 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.034526110 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.034571886 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.035121918 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035140038 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035151005 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035185099 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.035250902 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035262108 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035271883 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035283089 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035296917 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.035326004 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.035403013 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035414934 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035424948 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035435915 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035446882 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.035465002 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.035465956 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.035502911 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.036093950 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.036139011 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.036150932 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.036180973 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.036181927 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.036225080 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.036227942 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.036240101 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.036266088 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.036274910 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.077703953 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.140542030 CEST8049735178.237.33.50192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.140630007 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:41:59.262233973 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262248993 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262259960 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262270927 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262335062 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.262346983 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262388945 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262401104 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262402058 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.262439966 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.262464046 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262480974 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262490034 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262510061 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.262538910 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.262605906 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262617111 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262626886 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262636900 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262665987 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.262696981 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.262762070 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262773037 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262783051 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262794018 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262804031 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.262814045 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.262851954 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.263109922 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263154030 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263159037 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.263164997 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263209105 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.263245106 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263256073 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263264894 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263276100 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263298035 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.263328075 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.263418913 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263430119 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263441086 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263453007 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263463020 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263467073 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.263499975 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.263756037 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263803005 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263806105 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.263813972 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263845921 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.263864994 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263875961 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263921976 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.263986111 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.263995886 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264007092 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264017105 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264029026 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264039040 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.264066935 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.264118910 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264130116 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264139891 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264163017 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.264192104 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.264492989 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264518023 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264527082 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264563084 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.264647961 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264657974 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264667988 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264678955 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264694929 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.264722109 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.264754057 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264765978 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264797926 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.264889956 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264900923 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264909983 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264919996 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264930010 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264940023 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264946938 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.264950991 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.264982939 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.264982939 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.265011072 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.265429020 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265439987 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265450954 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265497923 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.265568018 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265578032 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265588045 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265599012 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265610933 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.265639067 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.265732050 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265747070 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265758038 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265768051 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265772104 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.265778065 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265789032 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265793085 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.265800953 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265811920 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265821934 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.265824080 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.265846014 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.265872002 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.266333103 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.266391993 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.266402006 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.266433954 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.266450882 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.266462088 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.266509056 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.491461039 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491473913 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491488934 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491498947 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491508007 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491518974 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491529942 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491553068 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.491596937 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.491652966 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491662979 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491672039 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491679907 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491691113 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491698980 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.491699934 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491709948 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491719007 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491719961 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.491729021 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491739035 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.491772890 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.491906881 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491949081 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491957903 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.491982937 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492046118 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492055893 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492064953 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492086887 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492099047 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492106915 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492130995 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492141008 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492166996 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492238045 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492249012 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492258072 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492280006 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492306948 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492368937 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492378950 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492388964 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492419958 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492487907 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492497921 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492506981 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492516994 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492532969 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492562056 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492672920 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492681980 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492691040 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492701054 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492711067 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492717028 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492721081 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492733955 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492737055 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492754936 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492783070 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.492908001 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492918015 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492928028 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.492968082 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.493002892 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493011951 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493021011 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493030071 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493052006 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.493052959 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.493195057 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493204117 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493221045 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493231058 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493232965 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.493240118 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493249893 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493261099 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493268967 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.493292093 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.493318081 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.493328094 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493341923 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493366003 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493376017 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.493385077 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.493412018 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.496400118 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496433020 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496480942 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.496531963 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496541977 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496551037 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496565104 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496573925 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496575117 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.496584892 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496607065 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.496625900 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.496634960 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496644974 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496679068 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.496715069 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496723890 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496732950 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496742010 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496752977 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496778965 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.496953964 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496997118 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.496997118 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497008085 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497049093 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497052908 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497062922 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497103930 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497107983 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497117996 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497127056 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497153997 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497195005 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497205019 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497214079 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497237921 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497266054 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497272015 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497282028 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497292042 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497320890 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497337103 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497369051 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497457027 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497473001 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497482061 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497510910 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497566938 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497576952 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497586012 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497606993 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497633934 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497669935 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497679949 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497689962 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497699976 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497715950 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497744083 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497855902 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497864962 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497873068 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497881889 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497890949 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497903109 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497905016 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497915030 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497922897 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497924089 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497940063 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.497941971 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.497972965 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.498142958 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.498186111 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.498188972 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.498202085 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.498238087 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.498239994 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.498280048 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.498290062 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.498298883 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.498322010 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.498351097 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.508081913 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.583914042 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.583930969 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.583941936 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.583952904 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.583996058 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.584019899 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.584026098 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.584031105 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.584043026 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.584053993 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.584073067 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.584095955 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.584130049 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.584141016 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.584151983 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.584172964 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.584172964 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.584222078 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.584250927 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.584261894 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.584295034 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.584597111 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.624574900 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.723443031 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723455906 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723472118 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723483086 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723496914 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723520994 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.723558903 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.723562002 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723573923 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723588943 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723606110 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.723630905 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.723670006 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723680019 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723690987 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723756075 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.723762035 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723776102 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723787069 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723809004 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.723829031 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.723957062 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723967075 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723978043 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.723990917 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724001884 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724011898 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724020004 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724024057 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724035025 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724056959 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724086046 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724098921 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724244118 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724253893 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724263906 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724275112 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724284887 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724294901 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724296093 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724307060 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724317074 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724327087 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724334002 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724354029 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724381924 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724545956 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724556923 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724566936 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724575996 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724586964 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724596024 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724596977 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724607944 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724612951 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724617004 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724642038 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724656105 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724662066 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724666119 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724675894 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724687099 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724697113 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724706888 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724716902 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724718094 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724728107 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724739075 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724739075 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724750042 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.724755049 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724778891 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.724802017 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725244045 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725255013 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725264072 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725272894 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725282907 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725294113 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725297928 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725303888 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725316048 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725327015 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725333929 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725337982 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725348949 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725358009 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725368023 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725372076 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725378990 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725389957 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725410938 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725410938 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725601912 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725611925 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725621939 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725630999 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725641966 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725642920 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725675106 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725704908 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725722075 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725733042 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725742102 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725753069 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725763083 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725773096 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725778103 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725781918 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725792885 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725804090 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725805044 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725805044 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725816011 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.725843906 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.725871086 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.726186991 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.726197004 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.726207018 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.726217031 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.726227999 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.726238012 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.726243019 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.726248980 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.726259947 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.726264954 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.726272106 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:41:59.726299047 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:41:59.726326942 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:42:00.946985960 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:42:00.951908112 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.951920986 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.951944113 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.951951981 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.951982975 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:42:00.951997042 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.952006102 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.952049017 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:42:00.952050924 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.952049017 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:42:00.952059984 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.952074051 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.952095032 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.956796885 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.956857920 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.956866980 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.957009077 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.957016945 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.957025051 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.970763922 CEST656549734103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:00.970875025 CEST497346565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:42:25.269999981 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:25.271645069 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:42:25.276555061 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:55.285389900 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:42:55.286515951 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:42:55.291443110 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:43:06.609344959 CEST4972380192.168.2.493.184.221.240
                                                                                  Sep 30, 2024 02:43:06.609416008 CEST4972480192.168.2.493.184.221.240
                                                                                  Sep 30, 2024 02:43:06.614645004 CEST804972393.184.221.240192.168.2.4
                                                                                  Sep 30, 2024 02:43:06.614718914 CEST4972380192.168.2.493.184.221.240
                                                                                  Sep 30, 2024 02:43:06.614911079 CEST804972493.184.221.240192.168.2.4
                                                                                  Sep 30, 2024 02:43:06.614968061 CEST4972480192.168.2.493.184.221.240
                                                                                  Sep 30, 2024 02:43:25.286452055 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:43:25.292855978 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:43:25.297710896 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:43:47.469439030 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:43:47.781109095 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:43:48.390537024 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:43:49.593592882 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:43:51.999844074 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:43:55.303850889 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:43:55.305219889 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:43:55.312740088 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:43:56.812397957 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:44:06.421880960 CEST4973580192.168.2.4178.237.33.50
                                                                                  Sep 30, 2024 02:44:25.301352024 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:44:25.302630901 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:44:25.307553053 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:44:55.316513062 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:44:55.317954063 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:44:55.323852062 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:45:25.332957029 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:45:25.337560892 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:45:25.342372894 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:45:55.334168911 CEST656549732103.186.116.220192.168.2.4
                                                                                  Sep 30, 2024 02:45:55.335813046 CEST497326565192.168.2.4103.186.116.220
                                                                                  Sep 30, 2024 02:45:55.340653896 CEST656549732103.186.116.220192.168.2.4
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Sep 30, 2024 02:41:57.486057043 CEST5771553192.168.2.41.1.1.1
                                                                                  Sep 30, 2024 02:41:57.493779898 CEST53577151.1.1.1192.168.2.4
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Sep 30, 2024 02:41:57.486057043 CEST192.168.2.41.1.1.10x50bStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Sep 30, 2024 02:41:57.493779898 CEST1.1.1.1192.168.2.40x50bNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                  Sep 30, 2024 02:42:12.953277111 CEST1.1.1.1192.168.2.40x8da2No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                  Sep 30, 2024 02:42:12.953277111 CEST1.1.1.1192.168.2.40x8da2No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                                  Sep 30, 2024 02:42:13.446901083 CEST1.1.1.1192.168.2.40xd4e6No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                  Sep 30, 2024 02:42:13.446901083 CEST1.1.1.1192.168.2.40xd4e6No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                                  Sep 30, 2024 02:42:26.447046995 CEST1.1.1.1192.168.2.40x5798No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                  Sep 30, 2024 02:42:26.447046995 CEST1.1.1.1192.168.2.40x5798No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                                  • geoplugin.net
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.449735178.237.33.50805460C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Sep 30, 2024 02:41:57.504410028 CEST71OUTGET /json.gp HTTP/1.1
                                                                                  Host: geoplugin.net
                                                                                  Cache-Control: no-cache
                                                                                  Sep 30, 2024 02:41:58.136635065 CEST1170INHTTP/1.1 200 OK
                                                                                  date: Mon, 30 Sep 2024 00:41:58 GMT
                                                                                  server: Apache
                                                                                  content-length: 962
                                                                                  content-type: application/json; charset=utf-8
                                                                                  cache-control: public, max-age=300
                                                                                  access-control-allow-origin: *
                                                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 30 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                                  Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"0ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:20:41:54
                                                                                  Start date:29/09/2024
                                                                                  Path:C:\Users\user\Desktop\yVhGfho0R4.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\yVhGfho0R4.exe"
                                                                                  Imagebase:0xb50000
                                                                                  File size:987'136 bytes
                                                                                  MD5 hash:6138A05E066E20C8E39C760BEC68E113
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1673477295.0000000004A6A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1673477295.0000000003F69000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:2
                                                                                  Start time:20:41:55
                                                                                  Start date:29/09/2024
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                  Imagebase:0x570000
                                                                                  File size:262'432 bytes
                                                                                  MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.4116138513.0000000000B37000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Target ID:3
                                                                                  Start time:20:41:59
                                                                                  Start date:29/09/2024
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\ghpxetgawuzqhlhqyiosoy"
                                                                                  Imagebase:0xe80000
                                                                                  File size:262'432 bytes
                                                                                  MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:4
                                                                                  Start time:20:41:59
                                                                                  Start date:29/09/2024
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"
                                                                                  Imagebase:0x120000
                                                                                  File size:262'432 bytes
                                                                                  MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:5
                                                                                  Start time:20:41:59
                                                                                  Start date:29/09/2024
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"
                                                                                  Imagebase:0x1e0000
                                                                                  File size:262'432 bytes
                                                                                  MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:6
                                                                                  Start time:20:41:59
                                                                                  Start date:29/09/2024
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\qccpxmqukcrvrrvupsbtqlykp"
                                                                                  Imagebase:0xe30000
                                                                                  File size:262'432 bytes
                                                                                  MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:7
                                                                                  Start time:20:41:59
                                                                                  Start date:29/09/2024
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe /stext "C:\Users\user\AppData\Local\Temp\aeiaxebwykjatxryydovbqttyepx"
                                                                                  Imagebase:0xc10000
                                                                                  File size:262'432 bytes
                                                                                  MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:9.1%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:128
                                                                                    Total number of Limit Nodes:6
                                                                                    execution_graph 21419 7625078 21420 7625203 21419->21420 21422 762509e 21419->21422 21422->21420 21423 76211e0 21422->21423 21424 7625700 PostMessageW 21423->21424 21425 762576c 21424->21425 21425->21422 21273 174b378 21274 174b3c0 GetModuleHandleW 21273->21274 21275 174b3ba 21273->21275 21276 174b3ed 21274->21276 21275->21274 21277 174d138 21278 174d17e 21277->21278 21282 174d318 21278->21282 21285 174d308 21278->21285 21279 174d26b 21288 174b348 21282->21288 21286 174d346 21285->21286 21287 174b348 DuplicateHandle 21285->21287 21286->21279 21287->21286 21289 174d380 DuplicateHandle 21288->21289 21290 174d346 21289->21290 21290->21279 21426 1744668 21427 174467a 21426->21427 21428 1744686 21427->21428 21430 1744779 21427->21430 21431 174479d 21430->21431 21435 1744878 21431->21435 21439 1744888 21431->21439 21437 1744888 21435->21437 21436 174498c 21436->21436 21437->21436 21443 1744248 21437->21443 21440 17448af 21439->21440 21441 1744248 CreateActCtxA 21440->21441 21442 174498c 21440->21442 21441->21442 21444 1745918 CreateActCtxA 21443->21444 21446 17459db 21444->21446 21291 76235ad 21292 76234a4 21291->21292 21293 76234b3 21292->21293 21296 7623ee8 21292->21296 21309 7623ef8 21292->21309 21297 7623f12 21296->21297 21298 7623f36 21297->21298 21322 76247f3 21297->21322 21326 762447c 21297->21326 21331 76243fe 21297->21331 21336 7624338 21297->21336 21340 762478b 21297->21340 21347 76245ca 21297->21347 21351 762492a 21297->21351 21356 76243e4 21297->21356 21361 7624851 21297->21361 21365 76246a0 21297->21365 21298->21293 21310 7623f12 21309->21310 21311 7623f36 21310->21311 21312 76247f3 2 API calls 21310->21312 21313 76246a0 2 API calls 21310->21313 21314 7624851 2 API calls 21310->21314 21315 76243e4 2 API calls 21310->21315 21316 762492a 2 API calls 21310->21316 21317 76245ca 2 API calls 21310->21317 21318 762478b 4 API calls 21310->21318 21319 7624338 2 API calls 21310->21319 21320 76243fe 2 API calls 21310->21320 21321 762447c 2 API calls 21310->21321 21311->21293 21312->21311 21313->21311 21314->21311 21315->21311 21316->21311 21317->21311 21318->21311 21319->21311 21320->21311 21321->21311 21369 7622830 21322->21369 21373 762282a 21322->21373 21323 762480d 21327 7624482 21326->21327 21377 7622e00 21327->21377 21381 7622df8 21327->21381 21328 7624bff 21332 762441f 21331->21332 21333 76243cc 21332->21333 21385 7622340 21332->21385 21389 7622348 21332->21389 21333->21298 21393 7623088 21336->21393 21397 762307c 21336->21397 21345 7622e00 WriteProcessMemory 21340->21345 21346 7622df8 WriteProcessMemory 21340->21346 21341 762441f 21342 76243cc 21341->21342 21343 7622340 ResumeThread 21341->21343 21344 7622348 ResumeThread 21341->21344 21342->21298 21343->21342 21344->21342 21345->21341 21346->21341 21349 7622e00 WriteProcessMemory 21347->21349 21350 7622df8 WriteProcessMemory 21347->21350 21348 76243cc 21348->21298 21349->21348 21350->21348 21352 7624930 21351->21352 21354 7622340 ResumeThread 21352->21354 21355 7622348 ResumeThread 21352->21355 21353 76243cc 21353->21298 21354->21353 21355->21353 21357 7624639 21356->21357 21401 7622ee9 21357->21401 21406 7622ef0 21357->21406 21358 76243cc 21358->21298 21363 7622830 Wow64SetThreadContext 21361->21363 21364 762282a Wow64SetThreadContext 21361->21364 21362 762486b 21363->21362 21364->21362 21410 7622d40 21365->21410 21414 7622d3a 21365->21414 21366 76246be 21370 7622875 Wow64SetThreadContext 21369->21370 21372 76228bd 21370->21372 21372->21323 21374 7622875 Wow64SetThreadContext 21373->21374 21376 76228bd 21374->21376 21376->21323 21378 7622e48 WriteProcessMemory 21377->21378 21380 7622e9f 21378->21380 21380->21328 21382 7622e48 WriteProcessMemory 21381->21382 21384 7622e9f 21382->21384 21384->21328 21386 7622388 ResumeThread 21385->21386 21388 76223b9 21386->21388 21388->21333 21390 7622388 ResumeThread 21389->21390 21392 76223b9 21390->21392 21392->21333 21394 7623111 21393->21394 21394->21394 21395 7623276 CreateProcessA 21394->21395 21396 76232d3 21395->21396 21398 7623111 21397->21398 21398->21398 21399 7623276 CreateProcessA 21398->21399 21400 76232d3 21399->21400 21400->21400 21402 7622ed5 21401->21402 21403 7622eee ReadProcessMemory 21401->21403 21402->21358 21405 7622f7f 21403->21405 21405->21358 21407 7622f3b ReadProcessMemory 21406->21407 21409 7622f7f 21407->21409 21409->21358 21411 7622d80 VirtualAllocEx 21410->21411 21413 7622dbd 21411->21413 21413->21366 21415 7622d24 21414->21415 21416 7622d3e VirtualAllocEx 21414->21416 21415->21366 21418 7622dbd 21416->21418 21418->21366

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 317 762307c-762311d 319 7623156-7623176 317->319 320 762311f-7623129 317->320 325 7623178-7623182 319->325 326 76231af-76231de 319->326 320->319 321 762312b-762312d 320->321 323 7623150-7623153 321->323 324 762312f-7623139 321->324 323->319 327 762313b 324->327 328 762313d-762314c 324->328 325->326 329 7623184-7623186 325->329 336 76231e0-76231ea 326->336 337 7623217-76232d1 CreateProcessA 326->337 327->328 328->328 330 762314e 328->330 331 7623188-7623192 329->331 332 76231a9-76231ac 329->332 330->323 334 7623196-76231a5 331->334 335 7623194 331->335 332->326 334->334 338 76231a7 334->338 335->334 336->337 339 76231ec-76231ee 336->339 348 76232d3-76232d9 337->348 349 76232da-7623360 337->349 338->332 341 76231f0-76231fa 339->341 342 7623211-7623214 339->342 343 76231fe-762320d 341->343 344 76231fc 341->344 342->337 343->343 345 762320f 343->345 344->343 345->342 348->349 359 7623362-7623366 349->359 360 7623370-7623374 349->360 359->360 361 7623368 359->361 362 7623376-762337a 360->362 363 7623384-7623388 360->363 361->360 362->363 364 762337c 362->364 365 762338a-762338e 363->365 366 7623398-762339c 363->366 364->363 365->366 367 7623390 365->367 368 76233ae-76233b5 366->368 369 762339e-76233a4 366->369 367->366 370 76233b7-76233c6 368->370 371 76233cc 368->371 369->368 370->371 373 76233cd 371->373 373->373
                                                                                    APIs
                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 076232BE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 963392458-0
                                                                                    • Opcode ID: 9b1320b15a5bab9209b9a6eb971d961c3e4b3afa0a535fa85fa82ce7203945b2
                                                                                    • Instruction ID: b5cbe50b69c74f85914da446679364f04556e50915a42c0f8b648a0fe67c8d91
                                                                                    • Opcode Fuzzy Hash: 9b1320b15a5bab9209b9a6eb971d961c3e4b3afa0a535fa85fa82ce7203945b2
                                                                                    • Instruction Fuzzy Hash: 0B918DB1D0066ACFDB10CFA9C8447DDBBB2BF44314F0481AAD849A7350DB789986DF92

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 374 7623088-762311d 376 7623156-7623176 374->376 377 762311f-7623129 374->377 382 7623178-7623182 376->382 383 76231af-76231de 376->383 377->376 378 762312b-762312d 377->378 380 7623150-7623153 378->380 381 762312f-7623139 378->381 380->376 384 762313b 381->384 385 762313d-762314c 381->385 382->383 386 7623184-7623186 382->386 393 76231e0-76231ea 383->393 394 7623217-76232d1 CreateProcessA 383->394 384->385 385->385 387 762314e 385->387 388 7623188-7623192 386->388 389 76231a9-76231ac 386->389 387->380 391 7623196-76231a5 388->391 392 7623194 388->392 389->383 391->391 395 76231a7 391->395 392->391 393->394 396 76231ec-76231ee 393->396 405 76232d3-76232d9 394->405 406 76232da-7623360 394->406 395->389 398 76231f0-76231fa 396->398 399 7623211-7623214 396->399 400 76231fe-762320d 398->400 401 76231fc 398->401 399->394 400->400 402 762320f 400->402 401->400 402->399 405->406 416 7623362-7623366 406->416 417 7623370-7623374 406->417 416->417 418 7623368 416->418 419 7623376-762337a 417->419 420 7623384-7623388 417->420 418->417 419->420 421 762337c 419->421 422 762338a-762338e 420->422 423 7623398-762339c 420->423 421->420 422->423 424 7623390 422->424 425 76233ae-76233b5 423->425 426 762339e-76233a4 423->426 424->423 427 76233b7-76233c6 425->427 428 76233cc 425->428 426->425 427->428 430 76233cd 428->430 430->430
                                                                                    APIs
                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 076232BE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 963392458-0
                                                                                    • Opcode ID: e8b93a48590c66af6a01a829c288f0389ff93ce691bdab51ff89b681d01bd08d
                                                                                    • Instruction ID: 21f384619b4cd209b562319f788b7366cd7689a541183395af6cd5ae572b972f
                                                                                    • Opcode Fuzzy Hash: e8b93a48590c66af6a01a829c288f0389ff93ce691bdab51ff89b681d01bd08d
                                                                                    • Instruction Fuzzy Hash: 1D917DB1D0066ADFDB10CFA9C8447DDBBB2BF44314F0481A9E849A7340DB789986DF92

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 431 1744248-17459d9 CreateActCtxA 434 17459e2-1745a3c 431->434 435 17459db-17459e1 431->435 442 1745a3e-1745a41 434->442 443 1745a4b-1745a4f 434->443 435->434 442->443 444 1745a60 443->444 445 1745a51-1745a5d 443->445 447 1745a61 444->447 445->444 447->447
                                                                                    APIs
                                                                                    • CreateActCtxA.KERNEL32(?), ref: 017459C9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1670810180.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1740000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: e592722a02255c81d4da0582f9542c759f2a74ed7169bd516b7e5b7df37c9fe7
                                                                                    • Instruction ID: d714139627ca59bc16fcc929124b7259f125a30ac3900f7626cf2b2be67a0fb8
                                                                                    • Opcode Fuzzy Hash: e592722a02255c81d4da0582f9542c759f2a74ed7169bd516b7e5b7df37c9fe7
                                                                                    • Instruction Fuzzy Hash: 6641DFB0D00719CBDB24CFA9C884ADEBBB5BF49314F6480AAD408AB255DB756945CF90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 448 174590d-17459d9 CreateActCtxA 450 17459e2-1745a3c 448->450 451 17459db-17459e1 448->451 458 1745a3e-1745a41 450->458 459 1745a4b-1745a4f 450->459 451->450 458->459 460 1745a60 459->460 461 1745a51-1745a5d 459->461 463 1745a61 460->463 461->460 463->463
                                                                                    APIs
                                                                                    • CreateActCtxA.KERNEL32(?), ref: 017459C9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1670810180.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1740000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: dfec8d14ba30da50f00e0af48b83043d6aec1f1bfd59a4153e9be75abd72aaab
                                                                                    • Instruction ID: cf57b703841569d794690234786b87c1048e940d5c22f06778f6df1339167a62
                                                                                    • Opcode Fuzzy Hash: dfec8d14ba30da50f00e0af48b83043d6aec1f1bfd59a4153e9be75abd72aaab
                                                                                    • Instruction Fuzzy Hash: 0941D0B1D00719CFDB24CFA9C884ADDBBB5BF49304F6480AAD408AB255DB75694ACF90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 464 7622df8-7622e4e 466 7622e50-7622e5c 464->466 467 7622e5e-7622e9d WriteProcessMemory 464->467 466->467 469 7622ea6-7622ed6 467->469 470 7622e9f-7622ea5 467->470 470->469
                                                                                    APIs
                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07622E90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3559483778-0
                                                                                    • Opcode ID: 8e23b90f2a1e7e012aafe88b8c52837199e729b0c50eb0a1336ee3115febecae
                                                                                    • Instruction ID: 909bdd45114afeeaa1a871554c9bcd10b5bb6700415106b64e7ff47a1e45ee8f
                                                                                    • Opcode Fuzzy Hash: 8e23b90f2a1e7e012aafe88b8c52837199e729b0c50eb0a1336ee3115febecae
                                                                                    • Instruction Fuzzy Hash: 052146B59002199FCB10CFA9C985BDEBBF0FF48320F10882AE959A7250D7789955DFA4

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 475 7622e00-7622e4e 477 7622e50-7622e5c 475->477 478 7622e5e-7622e9d WriteProcessMemory 475->478 477->478 480 7622ea6-7622ed6 478->480 481 7622e9f-7622ea5 478->481 481->480
                                                                                    APIs
                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07622E90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3559483778-0
                                                                                    • Opcode ID: 4acc9baa147f8f0dade61547655b2023410f3b10b9d5906caac3bb6a12c55b83
                                                                                    • Instruction ID: 7c01be056dbae31e4a94ec0f1cece235a7473a23cdeffc7b63765aac9970c659
                                                                                    • Opcode Fuzzy Hash: 4acc9baa147f8f0dade61547655b2023410f3b10b9d5906caac3bb6a12c55b83
                                                                                    • Instruction Fuzzy Hash: 3A2155B19003199FCB10CFA9C880BDEBBF4FF48310F10882AE959A7250C778A954DFA4

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 486 7622ee9-7622eec 487 7622ed5-7622ed6 486->487 488 7622eee-7622f7d ReadProcessMemory 486->488 491 7622f86-7622fb6 488->491 492 7622f7f-7622f85 488->492 492->491
                                                                                    APIs
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07622F70
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessRead
                                                                                    • String ID:
                                                                                    • API String ID: 1726664587-0
                                                                                    • Opcode ID: 2b9bb8a68c8819f3d0bb0e215e4c7665028795fd6fa6bc8d4a2290d56e29e617
                                                                                    • Instruction ID: 12577aaebb0f60bf1417c5dedabb3acb2bfc18593b5a5bfb9698010e145a0b21
                                                                                    • Opcode Fuzzy Hash: 2b9bb8a68c8819f3d0bb0e215e4c7665028795fd6fa6bc8d4a2290d56e29e617
                                                                                    • Instruction Fuzzy Hash: 232136B18002199FCB10CFAAC941BEEBBF4BF48320F10882AE559A7250C7389545DFA4

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 497 174b348-174d414 DuplicateHandle 499 174d416-174d41c 497->499 500 174d41d-174d43a 497->500 499->500
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0174D346,?,?,?,?,?), ref: 0174D407
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1670810180.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1740000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: 664e10832855760d34871cdb0028aec1bea739ecc3842881dd2cea8dc3c89f8d
                                                                                    • Instruction ID: 3e83741d1f0adcce120523101cb8f949360a6f614765b4d2cebf4b4257154911
                                                                                    • Opcode Fuzzy Hash: 664e10832855760d34871cdb0028aec1bea739ecc3842881dd2cea8dc3c89f8d
                                                                                    • Instruction Fuzzy Hash: 9A21E4B5900208EFDB10CF9AD984ADEFFF4EB48320F14846AE954A7311D374A944CFA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 503 762282a-762287b 505 762288b-76228bb Wow64SetThreadContext 503->505 506 762287d-7622889 503->506 508 76228c4-76228f4 505->508 509 76228bd-76228c3 505->509 506->505 509->508
                                                                                    APIs
                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 076228AE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContextThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 983334009-0
                                                                                    • Opcode ID: 89b1d5725ec26f0a5f2168320877c6f6bd1b2b767feffae0c60aafa1ebcb2571
                                                                                    • Instruction ID: 9069a3d508c40bdab52eb792ac1600603c26b95df248bb6d83cfdbcb7b116b83
                                                                                    • Opcode Fuzzy Hash: 89b1d5725ec26f0a5f2168320877c6f6bd1b2b767feffae0c60aafa1ebcb2571
                                                                                    • Instruction Fuzzy Hash: 5A2168B5D002198FDB10CFA9C5857EEBBF4BF48324F10842AD459A7380DB789989CFA4

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 523 7622ef0-7622f7d ReadProcessMemory 526 7622f86-7622fb6 523->526 527 7622f7f-7622f85 523->527 527->526
                                                                                    APIs
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07622F70
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessRead
                                                                                    • String ID:
                                                                                    • API String ID: 1726664587-0
                                                                                    • Opcode ID: bd1cc16c64567ab3bca4f88492ac3ca42906b510e80a1c296548fbe04cee888f
                                                                                    • Instruction ID: b1957ff4dc7cf251921cbacfac1e94087bdf04b3dc5399cc2f8f6a5bcdf43cca
                                                                                    • Opcode Fuzzy Hash: bd1cc16c64567ab3bca4f88492ac3ca42906b510e80a1c296548fbe04cee888f
                                                                                    • Instruction Fuzzy Hash: DF2128B18002599FCB10DFAAC840ADEFBF5FF48310F108429E559A7250C7789944DFA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 513 7622830-762287b 515 762288b-76228bb Wow64SetThreadContext 513->515 516 762287d-7622889 513->516 518 76228c4-76228f4 515->518 519 76228bd-76228c3 515->519 516->515 519->518
                                                                                    APIs
                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 076228AE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContextThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 983334009-0
                                                                                    • Opcode ID: d5414195eb5463f9d26a0767d2c6eb5c5c08b6c160982adc139b41b855f91aba
                                                                                    • Instruction ID: 72e21a4a437f8b299631e062085650740b222e5ca3634f9261228b460314ae31
                                                                                    • Opcode Fuzzy Hash: d5414195eb5463f9d26a0767d2c6eb5c5c08b6c160982adc139b41b855f91aba
                                                                                    • Instruction Fuzzy Hash: 85213AB1D002198FDB14DFAAC4857EEBBF4FF48314F108429D459A7240DB789945CFA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 532 174d379-174d414 DuplicateHandle 533 174d416-174d41c 532->533 534 174d41d-174d43a 532->534 533->534
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0174D346,?,?,?,?,?), ref: 0174D407
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1670810180.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1740000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: 682562d547d1d1be721c9db64a4b8f8e4463c0a87b28601b3438f88ac9c36a36
                                                                                    • Instruction ID: ff71da8ea2f640acec0dc50e2105ac0cb0bae0581057eef29ec239b6ca871d7a
                                                                                    • Opcode Fuzzy Hash: 682562d547d1d1be721c9db64a4b8f8e4463c0a87b28601b3438f88ac9c36a36
                                                                                    • Instruction Fuzzy Hash: 6D21E3B5900248DFDB10CFAAD584ADEFFF4FB48320F14842AE958A7210D374A944CFA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 537 7622d3a-7622d3c 538 7622d24-7622d2a 537->538 539 7622d3e-7622dbb VirtualAllocEx 537->539 542 7622dc4-7622de9 539->542 543 7622dbd-7622dc3 539->543 543->542
                                                                                    APIs
                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07622DAE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 3bf7009d5fa35bd9b35ffbff974bd225fa42657557c38a3ba763c940d0bdf475
                                                                                    • Instruction ID: fefba2625520f206d0daa55e0510f9f5250d98d2a02a251fce6151e6cf3fd2c0
                                                                                    • Opcode Fuzzy Hash: 3bf7009d5fa35bd9b35ffbff974bd225fa42657557c38a3ba763c940d0bdf475
                                                                                    • Instruction Fuzzy Hash: CE1189B69002189FCB10CFA9D8447DEFBF5FF88324F20882AE519A7250C735A544CFA0
                                                                                    APIs
                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07622DAE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: ca29b268d7eff4e2290c12a14231bd13552b20b05a94a2bac0fb30307cc745c6
                                                                                    • Instruction ID: 6bcde47222544a10cfeaa7c747e644ca61343e223fe757aec02c265390b99be9
                                                                                    • Opcode Fuzzy Hash: ca29b268d7eff4e2290c12a14231bd13552b20b05a94a2bac0fb30307cc745c6
                                                                                    • Instruction Fuzzy Hash: 831137B29002599FCB10DFAAC844BDEBFF5FF88324F108819E559A7250C775A944CFA5
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: c303da5e66269bfc6fb005104fffd8f2cd21847a3480b754bc1e2c6ade4073fc
                                                                                    • Instruction ID: ea9708edd2d4ee3c7aa1cae98c166684d2b7f00d3721dfe23906c42c0eab66ee
                                                                                    • Opcode Fuzzy Hash: c303da5e66269bfc6fb005104fffd8f2cd21847a3480b754bc1e2c6ade4073fc
                                                                                    • Instruction Fuzzy Hash: C01166B5D002588FCB10DFAAC5457EEFBF5AF88324F24882AD159A7250C738A945CFA5
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: 1b9f1f34805012f53425a7de7336c00c1dd85ba1978ee56270294242abacbdc0
                                                                                    • Instruction ID: 49cbe9ec29192668244a2fc9f7b5225b6a205b318d496219183f941a57fd5088
                                                                                    • Opcode Fuzzy Hash: 1b9f1f34805012f53425a7de7336c00c1dd85ba1978ee56270294242abacbdc0
                                                                                    • Instruction Fuzzy Hash: A81136B19042598FCB20DFAAC4457DEFBF4EF88324F208829D459A7250CB79A944CFA5
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0174B3DE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1670810180.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1740000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID:
                                                                                    • API String ID: 4139908857-0
                                                                                    • Opcode ID: 51ce21a1657cabad81aac0be210512b1234ddbcf43c63cd884c66c7ac8dba383
                                                                                    • Instruction ID: 4a0d6d379c30f33720645a871996a72af9b12081f70d72927c5975fb2ba7c36f
                                                                                    • Opcode Fuzzy Hash: 51ce21a1657cabad81aac0be210512b1234ddbcf43c63cd884c66c7ac8dba383
                                                                                    • Instruction Fuzzy Hash: 9811F2B6C003498FDB10CF9AC444ADEFBF4EF88324F10846AD969A7610D379A945CFA5
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 0762575D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost
                                                                                    • String ID:
                                                                                    • API String ID: 410705778-0
                                                                                    • Opcode ID: a5f54509a7547764ec9e5778f410a07ab746e0896f2033c2e6c033aa64982d1c
                                                                                    • Instruction ID: 4fe54d488b0b226081fd1a757f39ae1d743fe9aacf2fd2285f999cd865cf2d76
                                                                                    • Opcode Fuzzy Hash: a5f54509a7547764ec9e5778f410a07ab746e0896f2033c2e6c033aa64982d1c
                                                                                    • Instruction Fuzzy Hash: 831136B5800358DFCB20DF99C884BDEBBF8EB48320F10845AE919A7311C375A944CFA5
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 0762575D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost
                                                                                    • String ID:
                                                                                    • API String ID: 410705778-0
                                                                                    • Opcode ID: 0af8aed6d6c159f9d4c1f7a966da3e41718938a16d130c9d40a5d07eb40384da
                                                                                    • Instruction ID: 0a12ff7843910d9ea5fc5f1f4095212b0479172e58a0cd936621dd2307b894ff
                                                                                    • Opcode Fuzzy Hash: 0af8aed6d6c159f9d4c1f7a966da3e41718938a16d130c9d40a5d07eb40384da
                                                                                    • Instruction Fuzzy Hash: AD1115B9800319DFDB10DF99D585BDEBBF4EB48320F20845AD559A7310C374A944CFA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1669577901.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_14fd000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1241ee33b5d6e811cae5a225118739160bc4f65fe52ee4a3415c06657287eeea
                                                                                    • Instruction ID: 9dc4fe6c5bf662164ccf2072303b9130094b0d20c4b58b16256a407696091b19
                                                                                    • Opcode Fuzzy Hash: 1241ee33b5d6e811cae5a225118739160bc4f65fe52ee4a3415c06657287eeea
                                                                                    • Instruction Fuzzy Hash: EA21E271900204DFDB05DF58D984B57BF65FB94314F20C17EDA094A366C336E456CAA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1669635542.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_150d000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 35b938fd174e04ca896428517fd19080d7b0ebbf7aa6804af16d1f16efef1ae1
                                                                                    • Instruction ID: 1eedf33098e4dfaf4c0442d0b7409a0d85085998618073d47ebfa28a68580744
                                                                                    • Opcode Fuzzy Hash: 35b938fd174e04ca896428517fd19080d7b0ebbf7aa6804af16d1f16efef1ae1
                                                                                    • Instruction Fuzzy Hash: DC210071604200DFDB16DFD8D994B2ABBB5FB84314F20C969D80E4F296D33AD446CA61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1669635542.000000000150D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0150D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_150d000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b665d0a12648d77961094a8b921558da67b0fcd7d65798a5bcc6d9c17e7d7b22
                                                                                    • Instruction ID: 12937bfb5f6baee2f0848182d78c4fa4502d3d70632a761dc27fc88d6ee70e66
                                                                                    • Opcode Fuzzy Hash: b665d0a12648d77961094a8b921558da67b0fcd7d65798a5bcc6d9c17e7d7b22
                                                                                    • Instruction Fuzzy Hash: EA2192755093808FDB03CFA4D994715BF71FB46214F28C5DAD8498F6A7C33A980ACB62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1669577901.00000000014FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014FD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_14fd000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                    • Instruction ID: c40739f5ac03cce7eaee46cf1e1b7ada630e026ea1f7dde37053c64e29a66ed5
                                                                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                                    • Instruction Fuzzy Hash: DC11CD72804240CFDB02CF44D9C4B56BF61FB94224F24C2AAD9090A766C33AE45ACBA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b6e6af04a315914d7ae65981e1a5898e280647bede5a6287ed0e978e1c37aa5d
                                                                                    • Instruction ID: 8416fc62756ff0687099f3542f403d05656a2900903ff5a69451b2c07af3ad04
                                                                                    • Opcode Fuzzy Hash: b6e6af04a315914d7ae65981e1a5898e280647bede5a6287ed0e978e1c37aa5d
                                                                                    • Instruction Fuzzy Hash: 3EE1BDB0701A118FDB69DB79C464BAAB7F6AF88300F14846DD1478B794CF35E806DBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: baf178b8de5d15e89be46cbb6014d1bfc9156ef2a4f145d2b261ed62c40c1b46
                                                                                    • Instruction ID: e0cb837b3173f1a3f131139be02df71be4668b3717336adf4bb50be0e007c78d
                                                                                    • Opcode Fuzzy Hash: baf178b8de5d15e89be46cbb6014d1bfc9156ef2a4f145d2b261ed62c40c1b46
                                                                                    • Instruction Fuzzy Hash: E7E10CB4E005198FCB14DFA9C5909AEFBB2FF89304F24C269E415A7356D731A942CFA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dfe357b29ebccd6ffdca22e83d295b26ac6e54705984cbe84c81680fab1731b7
                                                                                    • Instruction ID: 58a649f2b5ed1953dfa7e36656cab829e33f84b03b9f9f4a44fdf0f081d573e7
                                                                                    • Opcode Fuzzy Hash: dfe357b29ebccd6ffdca22e83d295b26ac6e54705984cbe84c81680fab1731b7
                                                                                    • Instruction Fuzzy Hash: D0E12CB4E005198FCB14DFA9C5909AEFBB2FF49304F25C259E415AB356DB31A942CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dd50c65397269b8a130d1dd8194e4f9ad62efbf162f373ac95518ed118b670c6
                                                                                    • Instruction ID: f04e4ded66eaced436cb29c957e1747b1dd4432b970167375245705892dec156
                                                                                    • Opcode Fuzzy Hash: dd50c65397269b8a130d1dd8194e4f9ad62efbf162f373ac95518ed118b670c6
                                                                                    • Instruction Fuzzy Hash: 32E12AB4E001198FCB54DFA9C5909AEFBB2FF89304F25C269E415AB356D731A942CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7fb6e1fbdc7c94a5ff9db3ac403161a7d26a9879fca40d1193f37073f1543c5b
                                                                                    • Instruction ID: 918e6623624d9e0d7fbe564472fa9c997aba1b5fce55bf023d5064d2cd788370
                                                                                    • Opcode Fuzzy Hash: 7fb6e1fbdc7c94a5ff9db3ac403161a7d26a9879fca40d1193f37073f1543c5b
                                                                                    • Instruction Fuzzy Hash: 36E11CB4E005198FCB14DFA9C5809AEFBB2FF89304F24C269E415AB356D731A942CF61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 364acdbb2568ede9bac2288a4971298b25d13b9055af57b67d9b8f936e76f17d
                                                                                    • Instruction ID: cb794f7790e723cc0f11827fc59ad9d93ef636f96486fe2fccfd41067d7e76e8
                                                                                    • Opcode Fuzzy Hash: 364acdbb2568ede9bac2288a4971298b25d13b9055af57b67d9b8f936e76f17d
                                                                                    • Instruction Fuzzy Hash: A5E1FAB4E005198FCB54DFA9C5909AEFBB2FF89304F24C269E415AB356D731A942CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1670810180.0000000001740000.00000040.00000800.00020000.00000000.sdmp, Offset: 01740000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_1740000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5117fe10d6a9010803adb65a7129fb77508fd4c396dd64e2993cb77dd2ec7b84
                                                                                    • Instruction ID: 3c308c21f63f3655ef846e9d33dbf736b5ed1727f875f672d6968855048a588e
                                                                                    • Opcode Fuzzy Hash: 5117fe10d6a9010803adb65a7129fb77508fd4c396dd64e2993cb77dd2ec7b84
                                                                                    • Instruction Fuzzy Hash: 09A17F32E0021A8FCF19DFB9C9445DEFBB2FF95300B1585AAE905AB255DB71E905CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8e0c94172a81d42209a49e8409c27bbf0f9f3a8d89f9eb0163e67083ee5fae35
                                                                                    • Instruction ID: 963bedb6f9141f5145d0f315e985f1502f1f88f9a2c4906b8872838b28258849
                                                                                    • Opcode Fuzzy Hash: 8e0c94172a81d42209a49e8409c27bbf0f9f3a8d89f9eb0163e67083ee5fae35
                                                                                    • Instruction Fuzzy Hash: B06172B0E042598FCB15CFA9C98059EFBF2BF49304F2481AAD415AB316D7359942CF61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.1676139107.0000000007620000.00000040.00000800.00020000.00000000.sdmp, Offset: 07620000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_7620000_yVhGfho0R4.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 65f967b249a32be2050064078b4652e4b56857aa91894368684dc9d142a79c4e
                                                                                    • Instruction ID: 9acac8882a7d0b4c0e10eb0c468aaa0fb64b15e397f79587c0a4965269cfce44
                                                                                    • Opcode Fuzzy Hash: 65f967b249a32be2050064078b4652e4b56857aa91894368684dc9d142a79c4e
                                                                                    • Instruction Fuzzy Hash: 21C0807E96E494D9C6804D4464040F4FF7CD687151F4534A2C15F67025CB2149236F94

                                                                                    Execution Graph

                                                                                    Execution Coverage:4.7%
                                                                                    Dynamic/Decrypted Code Coverage:4.3%
                                                                                    Signature Coverage:6%
                                                                                    Total number of Nodes:1642
                                                                                    Total number of Limit Nodes:41
                                                                                    execution_graph 52344 415d41 52359 41b411 52344->52359 52346 415d4a 52370 4020f6 52346->52370 52351 4170c4 52394 401e8d 52351->52394 52355 401fd8 11 API calls 52356 4170d9 52355->52356 52357 401fd8 11 API calls 52356->52357 52358 4170e5 52357->52358 52400 4020df 52359->52400 52364 41b456 InternetReadFile 52368 41b479 52364->52368 52365 41b4a6 InternetCloseHandle InternetCloseHandle 52367 41b4b8 52365->52367 52367->52346 52368->52364 52368->52365 52369 401fd8 11 API calls 52368->52369 52411 4020b7 52368->52411 52369->52368 52371 40210c 52370->52371 52372 4023ce 11 API calls 52371->52372 52373 402126 52372->52373 52374 402569 28 API calls 52373->52374 52375 402134 52374->52375 52376 404aa1 52375->52376 52377 404ab4 52376->52377 52478 40520c 52377->52478 52379 404ac9 ctype 52380 404b40 WaitForSingleObject 52379->52380 52381 404b20 52379->52381 52382 404b56 52380->52382 52383 404b32 send 52381->52383 52484 4210cb 54 API calls 52382->52484 52385 404b7b 52383->52385 52387 401fd8 11 API calls 52385->52387 52386 404b69 SetEvent 52386->52385 52388 404b83 52387->52388 52389 401fd8 11 API calls 52388->52389 52390 404b8b 52389->52390 52390->52351 52391 401fd8 52390->52391 52392 4023ce 11 API calls 52391->52392 52393 401fe1 52392->52393 52393->52351 52395 402163 52394->52395 52399 40219f 52395->52399 52502 402730 11 API calls 52395->52502 52397 402184 52503 402712 11 API calls std::_Deallocate 52397->52503 52399->52355 52401 4020e7 52400->52401 52417 4023ce 52401->52417 52403 4020f2 52404 43bda0 52403->52404 52406 4461b8 __Getctype 52404->52406 52405 4461f6 52433 44062d 20 API calls __dosmaperr 52405->52433 52406->52405 52407 4461e1 RtlAllocateHeap 52406->52407 52432 443001 7 API calls 2 library calls 52406->52432 52407->52406 52409 41b42f InternetOpenW InternetOpenUrlW 52407->52409 52409->52364 52412 4020bf 52411->52412 52413 4023ce 11 API calls 52412->52413 52414 4020ca 52413->52414 52434 40250a 52414->52434 52416 4020d9 52416->52368 52418 402428 52417->52418 52419 4023d8 52417->52419 52418->52403 52419->52418 52421 4027a7 52419->52421 52422 402e21 52421->52422 52425 4016b4 52422->52425 52424 402e30 52424->52418 52426 4016cb 52425->52426 52429 4016c6 52425->52429 52427 4016f3 52426->52427 52426->52429 52427->52424 52431 43bd68 11 API calls _Atexit 52429->52431 52430 43bd67 52431->52430 52432->52406 52433->52409 52435 40251a 52434->52435 52436 402520 52435->52436 52437 402535 52435->52437 52441 402569 52436->52441 52451 4028e8 52437->52451 52440 402533 52440->52416 52462 402888 52441->52462 52443 40257d 52444 402592 52443->52444 52445 4025a7 52443->52445 52467 402a34 22 API calls 52444->52467 52447 4028e8 28 API calls 52445->52447 52450 4025a5 52447->52450 52448 40259b 52468 4029da 22 API calls 52448->52468 52450->52440 52452 4028f1 52451->52452 52453 402953 52452->52453 52454 4028fb 52452->52454 52476 4028a4 22 API calls 52453->52476 52457 402904 52454->52457 52458 402917 52454->52458 52470 402cae 52457->52470 52459 402915 52458->52459 52461 4023ce 11 API calls 52458->52461 52459->52440 52461->52459 52463 402890 52462->52463 52464 402898 52463->52464 52469 402ca3 22 API calls 52463->52469 52464->52443 52467->52448 52468->52450 52471 402cb8 __EH_prolog 52470->52471 52477 402e54 22 API calls 52471->52477 52473 4023ce 11 API calls 52475 402d92 52473->52475 52474 402d24 52474->52473 52475->52459 52477->52474 52479 405214 52478->52479 52480 4023ce 11 API calls 52479->52480 52481 40521f 52480->52481 52485 405234 52481->52485 52483 40522e 52483->52379 52484->52386 52486 405240 52485->52486 52487 40526e 52485->52487 52488 4028e8 28 API calls 52486->52488 52501 4028a4 22 API calls 52487->52501 52490 40524a 52488->52490 52490->52483 52502->52397 52503->52399 52504 1000c7a7 52505 1000c7be 52504->52505 52509 1000c82c 52504->52509 52505->52509 52516 1000c7e6 GetModuleHandleA 52505->52516 52506 1000c872 52507 1000c835 GetModuleHandleA 52510 1000c83f 52507->52510 52509->52506 52509->52507 52509->52510 52510->52509 52511 1000c85f GetProcAddress 52510->52511 52511->52509 52512 1000c7dd 52512->52509 52512->52510 52513 1000c800 GetProcAddress 52512->52513 52513->52509 52514 1000c80d VirtualProtect 52513->52514 52514->52509 52515 1000c81c VirtualProtect 52514->52515 52515->52509 52517 1000c82c 52516->52517 52518 1000c7ef 52516->52518 52520 1000c872 52517->52520 52521 1000c835 GetModuleHandleA 52517->52521 52523 1000c83f 52517->52523 52528 1000c803 GetProcAddress 52518->52528 52521->52523 52522 1000c7f4 52522->52517 52524 1000c800 GetProcAddress 52522->52524 52523->52517 52523->52523 52527 1000c85f GetProcAddress 52523->52527 52524->52517 52525 1000c80d VirtualProtect 52524->52525 52525->52517 52526 1000c81c VirtualProtect 52525->52526 52526->52517 52527->52517 52529 1000c82c 52528->52529 52530 1000c80d VirtualProtect 52528->52530 52532 1000c872 52529->52532 52533 1000c835 GetModuleHandleA 52529->52533 52530->52529 52531 1000c81c VirtualProtect 52530->52531 52531->52529 52535 1000c83f 52533->52535 52534 1000c85f GetProcAddress 52534->52535 52535->52529 52535->52534 52536 4165db 52547 401e65 52536->52547 52538 4165eb 52539 4020f6 28 API calls 52538->52539 52540 4165f6 52539->52540 52541 401e65 22 API calls 52540->52541 52542 416601 52541->52542 52543 4020f6 28 API calls 52542->52543 52544 41660c 52543->52544 52552 412965 52544->52552 52548 401e6d 52547->52548 52550 401e75 52548->52550 52571 402158 22 API calls 52548->52571 52550->52538 52572 40482d 52552->52572 52554 412979 52579 4048c8 connect 52554->52579 52558 41299a 52644 402f10 52558->52644 52561 404aa1 61 API calls 52562 4129ae 52561->52562 52563 401fd8 11 API calls 52562->52563 52564 4129b6 52563->52564 52649 404c10 52564->52649 52567 401fd8 11 API calls 52568 4129cc 52567->52568 52569 401fd8 11 API calls 52568->52569 52570 4129d4 52569->52570 52573 404846 socket 52572->52573 52574 404839 52572->52574 52575 404860 CreateEventW 52573->52575 52576 404842 52573->52576 52667 40489e WSAStartup 52574->52667 52575->52554 52576->52554 52578 40483e 52578->52573 52578->52576 52580 404a1b 52579->52580 52581 4048ee 52579->52581 52582 404a21 WSAGetLastError 52580->52582 52632 40497e 52580->52632 52583 404923 52581->52583 52581->52632 52668 40531e 52581->52668 52584 404a31 52582->52584 52582->52632 52703 420cf1 27 API calls 52583->52703 52586 404932 52584->52586 52587 404a36 52584->52587 52592 402093 28 API calls 52586->52592 52708 41cb72 30 API calls 52587->52708 52589 40490f 52673 402093 52589->52673 52591 40492b 52591->52586 52595 404941 52591->52595 52596 404a80 52592->52596 52594 404a40 52709 4052fd 28 API calls 52594->52709 52602 404950 52595->52602 52603 404987 52595->52603 52599 402093 28 API calls 52596->52599 52604 404a8f 52599->52604 52606 402093 28 API calls 52602->52606 52705 421ad1 54 API calls 52603->52705 52607 41b580 80 API calls 52604->52607 52610 40495f 52606->52610 52607->52632 52616 402093 28 API calls 52610->52616 52611 40498f 52613 4049c4 52611->52613 52614 404994 52611->52614 52707 420e97 28 API calls 52613->52707 52617 402093 28 API calls 52614->52617 52619 40496e 52616->52619 52621 4049a3 52617->52621 52622 41b580 80 API calls 52619->52622 52624 402093 28 API calls 52621->52624 52637 404973 52622->52637 52623 4049cc 52625 4049f9 CreateEventW CreateEventW 52623->52625 52627 402093 28 API calls 52623->52627 52626 4049b2 52624->52626 52625->52632 52628 41b580 80 API calls 52626->52628 52630 4049e2 52627->52630 52631 4049b7 52628->52631 52633 402093 28 API calls 52630->52633 52706 421143 52 API calls 52631->52706 52639 402f31 52632->52639 52634 4049f1 52633->52634 52636 41b580 80 API calls 52634->52636 52638 4049f6 52636->52638 52704 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52637->52704 52638->52625 52640 4020df 11 API calls 52639->52640 52641 402f3d 52640->52641 52642 4032a0 28 API calls 52641->52642 52643 402f59 52642->52643 52643->52558 52760 401fb0 52644->52760 52646 402f1e 52647 402055 11 API calls 52646->52647 52648 402f2d 52647->52648 52648->52561 52650 4020df 11 API calls 52649->52650 52651 404c27 52650->52651 52652 4020df 11 API calls 52651->52652 52662 404c30 52652->52662 52653 43bda0 ___std_exception_copy 21 API calls 52653->52662 52655 4020b7 28 API calls 52655->52662 52656 404ca1 52791 404e26 WaitForSingleObject 52656->52791 52660 401fd8 11 API calls 52660->52662 52661 401fd8 11 API calls 52663 404cb1 52661->52663 52662->52653 52662->52655 52662->52656 52662->52660 52763 404b96 52662->52763 52769 401fe2 52662->52769 52778 404cc3 52662->52778 52664 401fd8 11 API calls 52663->52664 52665 404cba 52664->52665 52665->52567 52667->52578 52669 4020df 11 API calls 52668->52669 52670 40532a 52669->52670 52710 4032a0 52670->52710 52672 405346 52672->52589 52674 40209b 52673->52674 52675 4023ce 11 API calls 52674->52675 52676 4020a6 52675->52676 52714 4024ed 52676->52714 52679 41b580 52680 41b631 52679->52680 52681 41b596 GetLocalTime 52679->52681 52683 401fd8 11 API calls 52680->52683 52682 40531e 28 API calls 52681->52682 52684 41b5d8 52682->52684 52685 41b639 52683->52685 52718 406383 52684->52718 52687 401fd8 11 API calls 52685->52687 52689 41b641 52687->52689 52689->52583 52690 402f10 28 API calls 52691 41b5f0 52690->52691 52692 406383 28 API calls 52691->52692 52693 41b5fc 52692->52693 52723 40723b 77 API calls 52693->52723 52695 41b60a 52696 401fd8 11 API calls 52695->52696 52697 41b616 52696->52697 52698 401fd8 11 API calls 52697->52698 52699 41b61f 52698->52699 52700 401fd8 11 API calls 52699->52700 52701 41b628 52700->52701 52702 401fd8 11 API calls 52701->52702 52702->52680 52703->52591 52704->52632 52705->52611 52706->52637 52707->52623 52708->52594 52712 4032aa 52710->52712 52711 4032c9 52711->52672 52712->52711 52713 4028e8 28 API calls 52712->52713 52713->52711 52715 4024f9 52714->52715 52716 40250a 28 API calls 52715->52716 52717 4020b1 52716->52717 52717->52679 52724 4051ef 52718->52724 52720 406391 52728 402055 52720->52728 52723->52695 52725 4051fb 52724->52725 52734 405274 52725->52734 52727 405208 52727->52720 52729 402061 52728->52729 52730 4023ce 11 API calls 52729->52730 52731 40207b 52730->52731 52756 40267a 52731->52756 52735 405282 52734->52735 52736 40529e 52735->52736 52737 405288 52735->52737 52739 4052f5 52736->52739 52740 4052b6 52736->52740 52745 4025f0 52737->52745 52754 4028a4 22 API calls 52739->52754 52743 4028e8 28 API calls 52740->52743 52744 40529c 52740->52744 52743->52744 52744->52727 52746 402888 22 API calls 52745->52746 52747 402602 52746->52747 52748 402672 52747->52748 52749 402629 52747->52749 52755 4028a4 22 API calls 52748->52755 52752 4028e8 28 API calls 52749->52752 52753 40263b 52749->52753 52752->52753 52753->52744 52757 40268b 52756->52757 52758 4023ce 11 API calls 52757->52758 52759 40208d 52758->52759 52759->52690 52761 4025f0 28 API calls 52760->52761 52762 401fbd 52761->52762 52762->52646 52764 404ba0 WaitForSingleObject 52763->52764 52765 404bcd recv 52763->52765 52804 421107 54 API calls 52764->52804 52767 404be0 52765->52767 52767->52662 52768 404bbc SetEvent 52768->52767 52770 401ff1 52769->52770 52771 402039 52769->52771 52772 4023ce 11 API calls 52770->52772 52771->52662 52773 401ffa 52772->52773 52774 40203c 52773->52774 52775 402015 52773->52775 52776 40267a 11 API calls 52774->52776 52805 403098 28 API calls 52775->52805 52776->52771 52779 4020df 11 API calls 52778->52779 52789 404cde 52779->52789 52780 404e13 52781 401fd8 11 API calls 52780->52781 52782 404e1c 52781->52782 52782->52662 52783 4041a2 28 API calls 52783->52789 52784 401fe2 28 API calls 52784->52789 52785 401fd8 11 API calls 52785->52789 52787 4020f6 28 API calls 52787->52789 52789->52780 52789->52783 52789->52784 52789->52785 52789->52787 52806 4129da 52789->52806 52850 401fc0 52789->52850 52792 404e40 SetEvent CloseHandle 52791->52792 52793 404e57 closesocket 52791->52793 52794 404ca8 52792->52794 52795 404e64 52793->52795 52794->52661 52796 404e7a 52795->52796 53415 4050e4 84 API calls 52795->53415 52798 404e8c WaitForSingleObject 52796->52798 52799 404ece SetEvent CloseHandle 52796->52799 53416 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52798->53416 52799->52794 52801 404e9b SetEvent WaitForSingleObject 53417 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 52801->53417 52803 404eb3 SetEvent CloseHandle CloseHandle 52803->52799 52804->52768 52805->52771 52807 4129ec 52806->52807 52854 4041a2 52807->52854 52810 4020f6 28 API calls 52811 412a0e 52810->52811 52812 4020f6 28 API calls 52811->52812 52813 412a1d 52812->52813 52857 41beac 52813->52857 52816 412ace 52817 401e8d 11 API calls 52816->52817 52819 412ad7 52817->52819 52818 401e65 22 API calls 52820 412a3d 52818->52820 52821 401fd8 11 API calls 52819->52821 52822 4020f6 28 API calls 52820->52822 52823 412ae0 52821->52823 52824 412a48 52822->52824 52825 401fd8 11 API calls 52823->52825 52826 401e65 22 API calls 52824->52826 52827 412ae8 52825->52827 52828 412a53 52826->52828 52827->52789 52829 4020f6 28 API calls 52828->52829 52830 412a5e 52829->52830 52831 401e65 22 API calls 52830->52831 52832 412a69 52831->52832 52833 4020f6 28 API calls 52832->52833 52834 412a74 52833->52834 52835 401e65 22 API calls 52834->52835 52836 412a7f 52835->52836 52837 4020f6 28 API calls 52836->52837 52838 412a8a 52837->52838 52839 401e65 22 API calls 52838->52839 52840 412a95 52839->52840 52841 4020f6 28 API calls 52840->52841 52842 412aa0 52841->52842 52843 401e65 22 API calls 52842->52843 52844 412aae 52843->52844 52845 4020f6 28 API calls 52844->52845 52846 412ab9 52845->52846 52879 412aef GetModuleFileNameW 52846->52879 52849 404e26 99 API calls 52849->52816 52851 401fd2 CreateEventA CreateThread WaitForSingleObject CloseHandle 52850->52851 52852 401fc9 52850->52852 52851->52789 53274 415b25 52851->53274 53273 4025e0 28 API calls 52852->53273 53026 40423a 52854->53026 52858 4020df 11 API calls 52857->52858 52878 41bebf 52858->52878 52859 41bf2f 52860 401fd8 11 API calls 52859->52860 52861 41bf61 52860->52861 52862 401fd8 11 API calls 52861->52862 52864 41bf69 52862->52864 52863 41bf31 52865 4041a2 28 API calls 52863->52865 52867 401fd8 11 API calls 52864->52867 52868 41bf3d 52865->52868 52866 4041a2 28 API calls 52866->52878 52869 412a26 52867->52869 52870 401fe2 28 API calls 52868->52870 52869->52816 52869->52818 52872 41bf46 52870->52872 52871 401fe2 28 API calls 52871->52878 52873 401fd8 11 API calls 52872->52873 52875 41bf4e 52873->52875 52874 401fd8 11 API calls 52874->52878 52877 41cec5 28 API calls 52875->52877 52877->52859 52878->52859 52878->52863 52878->52866 52878->52871 52878->52874 53032 41cec5 52878->53032 52880 4020df 11 API calls 52879->52880 52881 412b1a 52880->52881 52882 4020df 11 API calls 52881->52882 52883 412b26 52882->52883 52884 4020df 11 API calls 52883->52884 52906 412b32 52884->52906 52885 40da23 32 API calls 52885->52906 52886 401fd8 11 API calls 52886->52906 52887 41ba09 43 API calls 52887->52906 52888 4185a3 31 API calls 52888->52906 52889 412c58 Sleep 52889->52906 52890 40417e 28 API calls 52890->52906 52891 4042fc 79 API calls 52891->52906 52892 40431d 28 API calls 52892->52906 52893 403014 28 API calls 52893->52906 52894 401f09 11 API calls 52894->52906 52895 412cfa Sleep 52895->52906 52896 412d9c Sleep 52896->52906 52897 41c516 32 API calls 52897->52906 52898 412dff DeleteFileW 52898->52906 52899 412e36 DeleteFileW 52899->52906 52900 412e88 Sleep 52900->52906 52901 412e72 DeleteFileW 52901->52906 52902 412f01 52903 401f09 11 API calls 52902->52903 52904 412f0d 52903->52904 52905 401f09 11 API calls 52904->52905 52907 412f19 52905->52907 52906->52885 52906->52886 52906->52887 52906->52888 52906->52889 52906->52890 52906->52891 52906->52892 52906->52893 52906->52894 52906->52895 52906->52896 52906->52897 52906->52898 52906->52899 52906->52900 52906->52901 52906->52902 52910 412ecd Sleep 52906->52910 52908 401f09 11 API calls 52907->52908 52909 412f25 52908->52909 53068 40b93f 52909->53068 52912 401f09 11 API calls 52910->52912 52917 412edd 52912->52917 52913 412f38 52915 4020f6 28 API calls 52913->52915 52914 401f09 11 API calls 52914->52917 52916 412f58 52915->52916 53074 413268 52916->53074 52917->52906 52917->52914 52919 412eff 52917->52919 52919->52909 52922 412f6f 52923 4130e3 52922->52923 52924 412f8f 52922->52924 53089 41bdaf 52923->53089 52926 41bdaf 28 API calls 52924->52926 52928 412f9b 52926->52928 53102 41bc1f 52928->53102 52929 402f31 28 API calls 52931 413123 52929->52931 52933 402f10 28 API calls 52931->52933 52935 413132 52933->52935 52934 402f31 28 API calls 52936 412fe5 52934->52936 52937 402f10 28 API calls 52935->52937 52938 402f10 28 API calls 52936->52938 52940 41313e 52937->52940 52939 412ff4 52938->52939 52942 402f10 28 API calls 52939->52942 52941 402f10 28 API calls 52940->52941 52943 41314d 52941->52943 52944 413003 52942->52944 52945 402f10 28 API calls 52943->52945 52946 402f10 28 API calls 52944->52946 52947 41315c 52945->52947 52948 413012 52946->52948 52949 402f10 28 API calls 52947->52949 52950 402f10 28 API calls 52948->52950 52951 41316b 52949->52951 52952 413021 52950->52952 52953 402f10 28 API calls 52951->52953 52954 402f10 28 API calls 52952->52954 52955 41317a 52953->52955 52956 41302d 52954->52956 53093 402ea1 52955->53093 52958 402f10 28 API calls 52956->52958 52960 413039 52958->52960 52962 402ea1 28 API calls 52960->52962 52961 404aa1 61 API calls 52963 413191 52961->52963 52964 413048 52962->52964 52965 401fd8 11 API calls 52963->52965 52966 402f10 28 API calls 52964->52966 52967 41319d 52965->52967 52968 413054 52966->52968 52969 401fd8 11 API calls 52967->52969 52970 402ea1 28 API calls 52968->52970 52972 4131a9 52969->52972 52971 41305e 52970->52971 52974 404aa1 61 API calls 52971->52974 52973 401fd8 11 API calls 52972->52973 52975 4131b5 52973->52975 52976 41306b 52974->52976 52977 401fd8 11 API calls 52975->52977 52978 401fd8 11 API calls 52976->52978 52979 4131c1 52977->52979 52980 413074 52978->52980 52981 401fd8 11 API calls 52979->52981 52982 401fd8 11 API calls 52980->52982 52983 4131ca 52981->52983 52984 41307d 52982->52984 52985 401fd8 11 API calls 52983->52985 52986 401fd8 11 API calls 52984->52986 52987 4131d3 52985->52987 52988 413086 52986->52988 52989 401fd8 11 API calls 52987->52989 52990 401fd8 11 API calls 52988->52990 52991 4130d7 52989->52991 52992 41308f 52990->52992 52994 401fd8 11 API calls 52991->52994 52993 401fd8 11 API calls 52992->52993 52995 41309b 52993->52995 52996 4131e5 52994->52996 52997 401fd8 11 API calls 52995->52997 52998 401f09 11 API calls 52996->52998 52999 4130a7 52997->52999 53000 4131f1 52998->53000 53001 401fd8 11 API calls 52999->53001 53003 401fd8 11 API calls 53000->53003 53002 4130b3 53001->53002 53005 401fd8 11 API calls 53002->53005 53004 4131fd 53003->53004 53006 401fd8 11 API calls 53004->53006 53007 4130bf 53005->53007 53008 413209 53006->53008 53009 401fd8 11 API calls 53007->53009 53010 401fd8 11 API calls 53008->53010 53011 4130cb 53009->53011 53012 413215 53010->53012 53013 401fd8 11 API calls 53011->53013 53014 401fd8 11 API calls 53012->53014 53013->52991 53015 413221 53014->53015 53016 401fd8 11 API calls 53015->53016 53017 41322d 53016->53017 53018 401fd8 11 API calls 53017->53018 53019 413239 53018->53019 53020 401fd8 11 API calls 53019->53020 53021 413245 53020->53021 53022 401fd8 11 API calls 53021->53022 53023 413251 53022->53023 53024 401fd8 11 API calls 53023->53024 53025 412abe 53024->53025 53025->52849 53027 404243 53026->53027 53028 4023ce 11 API calls 53027->53028 53029 40424e 53028->53029 53030 402569 28 API calls 53029->53030 53031 4041b5 53030->53031 53031->52810 53033 41ced2 53032->53033 53034 41cf31 53033->53034 53038 41cee2 53033->53038 53035 41cf4b 53034->53035 53036 41d071 28 API calls 53034->53036 53052 41d1d7 28 API calls 53035->53052 53036->53035 53039 41cf1a 53038->53039 53043 41d071 53038->53043 53051 41d1d7 28 API calls 53039->53051 53040 41cf2d 53040->52878 53045 41d079 53043->53045 53044 41d0ab 53044->53039 53045->53044 53046 41d0af 53045->53046 53049 41d093 53045->53049 53063 402725 22 API calls 53046->53063 53053 41d0e2 53049->53053 53051->53040 53052->53040 53054 41d0ec __EH_prolog 53053->53054 53064 402717 22 API calls 53054->53064 53056 41d0ff 53065 41d1ee 11 API calls 53056->53065 53058 41d125 53059 41d15d 53058->53059 53066 402730 11 API calls 53058->53066 53059->53044 53061 41d144 53067 402712 11 API calls std::_Deallocate 53061->53067 53064->53056 53065->53058 53066->53061 53067->53059 53069 40b947 53068->53069 53107 402252 53069->53107 53071 40b952 53111 40b967 53071->53111 53073 40b961 53073->52913 53076 413277 53074->53076 53084 4132a6 53074->53084 53075 4132b5 53133 40417e 53075->53133 53143 411d2d 53076->53143 53081 401fd8 11 API calls 53082 412f63 53081->53082 53086 401f09 53082->53086 53084->53075 53139 10001c5b 53084->53139 53087 402252 11 API calls 53086->53087 53088 401f12 53087->53088 53088->52922 53090 41bdbc 53089->53090 53091 4020b7 28 API calls 53090->53091 53092 4130ec 53091->53092 53092->52929 53094 402eb0 53093->53094 53095 402ef2 53094->53095 53100 402ee7 53094->53100 53096 401fb0 28 API calls 53095->53096 53097 402ef0 53096->53097 53098 402055 11 API calls 53097->53098 53099 402f09 53098->53099 53099->52961 53263 403365 28 API calls 53100->53263 53264 441ed1 53102->53264 53105 402093 28 API calls 53106 412fb5 53105->53106 53106->52934 53108 40225c 53107->53108 53109 4022ac 53107->53109 53108->53109 53118 402779 11 API calls std::_Deallocate 53108->53118 53109->53071 53112 40b9a1 53111->53112 53113 40b973 53111->53113 53130 4028a4 22 API calls 53112->53130 53119 4027e6 53113->53119 53117 40b97d 53117->53073 53118->53109 53120 4027ef 53119->53120 53121 402851 53120->53121 53122 4027f9 53120->53122 53132 4028a4 22 API calls 53121->53132 53125 402802 53122->53125 53126 402815 53122->53126 53131 402aea 28 API calls __EH_prolog 53125->53131 53127 402813 53126->53127 53129 402252 11 API calls 53126->53129 53127->53117 53129->53127 53131->53127 53134 404186 53133->53134 53135 402252 11 API calls 53134->53135 53136 404191 53135->53136 53147 4041bc 53136->53147 53140 10001c6b ___scrt_fastfail 53139->53140 53168 100012ee 53140->53168 53142 10001c87 53142->53075 53210 411d39 53143->53210 53146 411fa2 22 API calls ___std_exception_copy 53146->53084 53148 4041c8 53147->53148 53151 4041d9 53148->53151 53150 40419c 53150->53081 53152 4041e9 53151->53152 53153 404206 53152->53153 53154 4041ef 53152->53154 53155 4027e6 28 API calls 53153->53155 53158 404267 53154->53158 53157 404204 53155->53157 53157->53150 53159 402888 22 API calls 53158->53159 53160 40427b 53159->53160 53161 404290 53160->53161 53162 4042a5 53160->53162 53164 4042df 22 API calls 53161->53164 53163 4027e6 28 API calls 53162->53163 53167 4042a3 53163->53167 53165 404299 53164->53165 53166 402c48 22 API calls 53165->53166 53166->53167 53167->53157 53169 10001324 ___scrt_fastfail 53168->53169 53170 100013b7 GetEnvironmentVariableW 53169->53170 53194 100010f1 53170->53194 53173 100010f1 57 API calls 53174 10001465 53173->53174 53175 100010f1 57 API calls 53174->53175 53176 10001479 53175->53176 53177 100010f1 57 API calls 53176->53177 53178 1000148d 53177->53178 53179 100010f1 57 API calls 53178->53179 53180 100014a1 53179->53180 53181 100010f1 57 API calls 53180->53181 53182 100014b5 lstrlenW 53181->53182 53183 100014d2 53182->53183 53184 100014d9 lstrlenW 53182->53184 53183->53142 53185 100010f1 57 API calls 53184->53185 53186 10001501 lstrlenW lstrcatW 53185->53186 53187 100010f1 57 API calls 53186->53187 53188 10001539 lstrlenW lstrcatW 53187->53188 53189 100010f1 57 API calls 53188->53189 53190 1000156b lstrlenW lstrcatW 53189->53190 53191 100010f1 57 API calls 53190->53191 53192 1000159d lstrlenW lstrcatW 53191->53192 53193 100010f1 57 API calls 53192->53193 53193->53183 53195 10001118 ___scrt_fastfail 53194->53195 53196 10001129 lstrlenW 53195->53196 53207 10002c40 53196->53207 53199 10001177 lstrlenW FindFirstFileW 53201 100011a0 53199->53201 53202 100011e1 53199->53202 53200 10001168 lstrlenW 53200->53199 53203 100011c7 FindNextFileW 53201->53203 53204 100011aa 53201->53204 53202->53173 53203->53201 53206 100011da FindClose 53203->53206 53204->53203 53209 10001000 57 API calls ___scrt_fastfail 53204->53209 53206->53202 53208 10001148 lstrcatW lstrlenW 53207->53208 53208->53199 53208->53200 53209->53204 53243 4117d7 53210->53243 53212 411d57 53213 411d6d SetLastError 53212->53213 53214 4117d7 SetLastError 53212->53214 53240 411d35 53212->53240 53213->53240 53215 411d8a 53214->53215 53215->53213 53217 411dac GetNativeSystemInfo 53215->53217 53215->53240 53218 411df2 53217->53218 53229 411dff SetLastError 53218->53229 53246 411cde VirtualAlloc 53218->53246 53221 411e22 53222 411e47 GetProcessHeap HeapAlloc 53221->53222 53256 411cde VirtualAlloc 53221->53256 53223 411e70 53222->53223 53224 411e5e 53222->53224 53227 4117d7 SetLastError 53223->53227 53257 411cf5 VirtualFree 53224->53257 53230 411eb9 53227->53230 53228 411e3a 53228->53222 53228->53229 53229->53240 53231 411f6b 53230->53231 53247 411cde VirtualAlloc 53230->53247 53258 4120b2 GetProcessHeap HeapFree 53231->53258 53234 411ed2 ctype 53248 4117ea SetLastError ctype ___scrt_get_show_window_mode 53234->53248 53236 411efe 53236->53231 53249 411b9a 26 API calls 53236->53249 53238 411f2b 53238->53231 53250 41198a 53238->53250 53240->53146 53241 411f36 53241->53231 53241->53240 53242 411f60 SetLastError 53241->53242 53242->53231 53244 4117e6 53243->53244 53245 4117db SetLastError 53243->53245 53244->53212 53245->53212 53246->53221 53247->53234 53248->53236 53249->53238 53251 4119b0 53250->53251 53253 411aab 53251->53253 53255 411a99 53251->53255 53259 4118ed 53251->53259 53252 4118ed VirtualProtect 53252->53253 53253->53241 53255->53252 53256->53228 53257->53229 53258->53240 53260 4118fe 53259->53260 53262 4118f6 53259->53262 53261 411971 VirtualProtect 53260->53261 53260->53262 53261->53262 53262->53251 53263->53097 53265 441edd 53264->53265 53268 441ccd 53265->53268 53267 41bc43 53267->53105 53269 441ce4 53268->53269 53271 441d1b pre_c_initialization 53269->53271 53272 44062d 20 API calls __dosmaperr 53269->53272 53271->53267 53272->53271 53273->52851 53275 4020f6 28 API calls 53274->53275 53276 415b47 SetEvent 53275->53276 53277 415b5c 53276->53277 53278 4041a2 28 API calls 53277->53278 53279 415b76 53278->53279 53280 4020f6 28 API calls 53279->53280 53281 415b86 53280->53281 53282 4020f6 28 API calls 53281->53282 53283 415b98 53282->53283 53284 41beac 28 API calls 53283->53284 53285 415ba1 53284->53285 53287 415bc1 GetTickCount 53285->53287 53288 415d20 53285->53288 53351 415d11 53285->53351 53286 401e8d 11 API calls 53289 4170cd 53286->53289 53290 41bc1f 28 API calls 53287->53290 53288->53351 53352 415d34 53288->53352 53292 401fd8 11 API calls 53289->53292 53293 415bd2 53290->53293 53295 4170d9 53292->53295 53353 41bb77 GetLastInputInfo GetTickCount 53293->53353 53297 401fd8 11 API calls 53295->53297 53296 415bde 53298 41bc1f 28 API calls 53296->53298 53299 4170e5 53297->53299 53300 415be9 53298->53300 53354 41bb27 53300->53354 53303 41bdaf 28 API calls 53304 415c05 53303->53304 53305 401e65 22 API calls 53304->53305 53306 415c13 53305->53306 53307 402f31 28 API calls 53306->53307 53308 415c21 53307->53308 53309 402ea1 28 API calls 53308->53309 53310 415c30 53309->53310 53311 402f10 28 API calls 53310->53311 53312 415c3f 53311->53312 53313 402ea1 28 API calls 53312->53313 53314 415c4e 53313->53314 53315 402f10 28 API calls 53314->53315 53316 415c5a 53315->53316 53317 402ea1 28 API calls 53316->53317 53318 415c64 53317->53318 53319 404aa1 61 API calls 53318->53319 53320 415c73 53319->53320 53321 401fd8 11 API calls 53320->53321 53322 415c7c 53321->53322 53323 401fd8 11 API calls 53322->53323 53324 415c88 53323->53324 53325 401fd8 11 API calls 53324->53325 53326 415c94 53325->53326 53327 401fd8 11 API calls 53326->53327 53328 415ca0 53327->53328 53329 401fd8 11 API calls 53328->53329 53330 415cac 53329->53330 53331 401fd8 11 API calls 53330->53331 53332 415cb8 53331->53332 53333 401f09 11 API calls 53332->53333 53334 415cc1 53333->53334 53335 401fd8 11 API calls 53334->53335 53336 415cca 53335->53336 53337 401fd8 11 API calls 53336->53337 53338 415cd3 53337->53338 53339 401e65 22 API calls 53338->53339 53340 415cde 53339->53340 53359 43bb2c 53340->53359 53343 415cf0 53346 415d09 53343->53346 53347 415cfe 53343->53347 53344 415d16 53345 401e65 22 API calls 53344->53345 53345->53288 53364 404f51 53346->53364 53363 404ff4 82 API calls 53347->53363 53350 415d04 53350->53351 53351->53286 53379 4050e4 84 API calls 53352->53379 53353->53296 53380 436f10 53354->53380 53356 41bb46 GetForegroundWindow GetWindowTextW 53357 40417e 28 API calls 53356->53357 53358 415bf7 53357->53358 53358->53303 53360 43bb45 _swprintf 53359->53360 53382 43ae83 53360->53382 53362 415ceb 53362->53343 53362->53344 53363->53350 53365 404fea 53364->53365 53366 404f65 53364->53366 53365->53351 53367 404f6e 53366->53367 53368 404fc0 CreateEventA CreateThread 53366->53368 53369 404f7d GetLocalTime 53366->53369 53367->53368 53368->53365 53411 405150 53368->53411 53370 41bc1f 28 API calls 53369->53370 53371 404f91 53370->53371 53410 4052fd 28 API calls 53371->53410 53379->53350 53381 436f27 53380->53381 53381->53356 53381->53381 53398 43ba8a 53382->53398 53384 43aed0 53404 43a837 36 API calls 2 library calls 53384->53404 53386 43ae95 53386->53384 53387 43aeaa 53386->53387 53397 43aeaf pre_c_initialization 53386->53397 53403 44062d 20 API calls __dosmaperr 53387->53403 53390 43aedc 53391 43af0b 53390->53391 53405 43bacf 40 API calls __Tolower 53390->53405 53394 43af77 53391->53394 53406 43ba36 20 API calls 2 library calls 53391->53406 53407 43ba36 20 API calls 2 library calls 53394->53407 53395 43b03e _swprintf 53395->53397 53408 44062d 20 API calls __dosmaperr 53395->53408 53397->53362 53399 43baa2 53398->53399 53400 43ba8f 53398->53400 53399->53386 53409 44062d 20 API calls __dosmaperr 53400->53409 53402 43ba94 pre_c_initialization 53402->53386 53403->53397 53404->53390 53405->53390 53406->53394 53407->53395 53408->53397 53409->53402 53414 40515c 102 API calls 53411->53414 53413 405159 53414->53413 53415->52796 53416->52801 53417->52803 53418 43bea8 53421 43beb4 _swprintf ___FrameUnwindToState 53418->53421 53419 43bec2 53434 44062d 20 API calls __dosmaperr 53419->53434 53421->53419 53422 43beec 53421->53422 53429 445909 EnterCriticalSection 53422->53429 53424 43bef7 53430 43bf98 53424->53430 53426 43bec7 pre_c_initialization ___FrameUnwindToState 53429->53424 53431 43bfa6 53430->53431 53433 43bf02 53431->53433 53436 4497ec 37 API calls 2 library calls 53431->53436 53435 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 53433->53435 53434->53426 53435->53426 53436->53431 53437 434918 53438 434924 ___FrameUnwindToState 53437->53438 53464 434627 53438->53464 53440 43492b 53442 434954 53440->53442 53762 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 53440->53762 53451 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 53442->53451 53763 4442d2 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 53442->53763 53444 43496d 53446 434973 ___FrameUnwindToState 53444->53446 53764 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 53444->53764 53447 4349f3 53475 434ba5 53447->53475 53451->53447 53765 443487 36 API calls 5 library calls 53451->53765 53457 434a15 53458 434a1f 53457->53458 53767 4434bf 28 API calls _Atexit 53457->53767 53460 434a28 53458->53460 53768 443462 28 API calls _Atexit 53458->53768 53769 43479e 13 API calls 2 library calls 53460->53769 53463 434a30 53463->53446 53465 434630 53464->53465 53770 434cb6 IsProcessorFeaturePresent 53465->53770 53467 43463c 53771 438fb1 10 API calls 4 library calls 53467->53771 53469 434641 53474 434645 53469->53474 53772 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53469->53772 53471 43464e 53472 43465c 53471->53472 53773 438fda 8 API calls 3 library calls 53471->53773 53472->53440 53474->53440 53476 436f10 ___scrt_get_show_window_mode 53475->53476 53477 434bb8 GetStartupInfoW 53476->53477 53478 4349f9 53477->53478 53479 444223 53478->53479 53774 44f0d9 53479->53774 53481 434a02 53484 40ea00 53481->53484 53482 44422c 53482->53481 53778 446895 36 API calls 53482->53778 53780 41cbe1 LoadLibraryA GetProcAddress 53484->53780 53486 40ea1c GetModuleFileNameW 53785 40f3fe 53486->53785 53488 40ea38 53489 4020f6 28 API calls 53488->53489 53490 40ea47 53489->53490 53491 4020f6 28 API calls 53490->53491 53492 40ea56 53491->53492 53493 41beac 28 API calls 53492->53493 53494 40ea5f 53493->53494 53800 40fb52 53494->53800 53496 40ea68 53497 401e8d 11 API calls 53496->53497 53498 40ea71 53497->53498 53499 40ea84 53498->53499 53500 40eace 53498->53500 53994 40fbee 97 API calls 53499->53994 53501 401e65 22 API calls 53500->53501 53503 40eade 53501->53503 53507 401e65 22 API calls 53503->53507 53504 40ea96 53505 401e65 22 API calls 53504->53505 53506 40eaa2 53505->53506 53995 410f72 36 API calls __EH_prolog 53506->53995 53508 40eafd 53507->53508 53509 40531e 28 API calls 53508->53509 53511 40eb0c 53509->53511 53513 406383 28 API calls 53511->53513 53512 40eab4 53996 40fb9f 78 API calls 53512->53996 53515 40eb18 53513->53515 53517 401fe2 28 API calls 53515->53517 53516 40eabd 53997 40f3eb 71 API calls 53516->53997 53519 40eb24 53517->53519 53520 401fd8 11 API calls 53519->53520 53521 40eb2d 53520->53521 53523 401fd8 11 API calls 53521->53523 53522 401fd8 11 API calls 53524 40ef36 53522->53524 53525 40eb36 53523->53525 53766 443396 GetModuleHandleW 53524->53766 53526 401e65 22 API calls 53525->53526 53527 40eb3f 53526->53527 53528 401fc0 28 API calls 53527->53528 53529 40eb4a 53528->53529 53530 401e65 22 API calls 53529->53530 53531 40eb63 53530->53531 53532 401e65 22 API calls 53531->53532 53533 40eb7e 53532->53533 53534 40ebe9 53533->53534 53998 406c59 53533->53998 53535 401e65 22 API calls 53534->53535 53540 40ebf6 53535->53540 53537 40ebab 53538 401fe2 28 API calls 53537->53538 53539 40ebb7 53538->53539 53541 401fd8 11 API calls 53539->53541 53546 413584 3 API calls 53540->53546 53556 40ec3d 53540->53556 53543 40ebc0 53541->53543 54003 413584 RegOpenKeyExA 53543->54003 53544 40ec43 53545 40eac6 53544->53545 53807 41b354 53544->53807 53545->53522 53551 40ec21 53546->53551 53550 40f38a 54096 4139e4 30 API calls 53550->54096 53551->53556 54006 4139e4 30 API calls 53551->54006 53552 40ecb1 53554 401e65 22 API calls 53552->53554 53559 40ecba 53554->53559 53804 40d0a4 53556->53804 53558 40ec5e 53558->53552 53824 407751 53558->53824 53568 40ecc6 53559->53568 53569 40eccb 53559->53569 53561 40f3a0 54097 4124b0 65 API calls ___scrt_get_show_window_mode 53561->54097 53562 40ec87 53566 401e65 22 API calls 53562->53566 53563 40ec7d 54007 407773 30 API calls 53563->54007 53578 40ec90 53566->53578 53567 40f3aa 53571 41bcef 28 API calls 53567->53571 54010 407790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 53568->54010 53574 401e65 22 API calls 53569->53574 53570 40ec82 54008 40729b 98 API calls 53570->54008 53575 40f3ba 53571->53575 53576 40ecd4 53574->53576 53896 413a5e RegOpenKeyExW 53575->53896 53828 41bcef 53576->53828 53578->53552 53582 40ecac 53578->53582 53579 40ecdf 53832 401f13 53579->53832 54009 40729b 98 API calls 53582->54009 53584 401f09 11 API calls 53587 40f3d7 53584->53587 53589 401f09 11 API calls 53587->53589 53588 401f09 11 API calls 53590 40ecf3 53588->53590 53592 40f3e0 53589->53592 53591 401e65 22 API calls 53590->53591 53593 40ecfc 53591->53593 53899 40dd7d 53592->53899 53597 401e65 22 API calls 53593->53597 53599 40ed16 53597->53599 53598 40f3ea 53600 401e65 22 API calls 53599->53600 53601 40ed30 53600->53601 53602 401e65 22 API calls 53601->53602 53603 40ed49 53602->53603 53604 40edb6 53603->53604 53605 401e65 22 API calls 53603->53605 53606 40edc5 53604->53606 53611 40ef41 ___scrt_get_show_window_mode 53604->53611 53610 40ed5e _wcslen 53605->53610 53607 40edce 53606->53607 53635 40ee4a ___scrt_get_show_window_mode 53606->53635 53608 401e65 22 API calls 53607->53608 53609 40edd7 53608->53609 53612 401e65 22 API calls 53609->53612 53610->53604 53613 401e65 22 API calls 53610->53613 54071 413733 RegOpenKeyExA 53611->54071 53614 40ede9 53612->53614 53615 40ed79 53613->53615 53617 401e65 22 API calls 53614->53617 53619 401e65 22 API calls 53615->53619 53618 40edfb 53617->53618 53622 401e65 22 API calls 53618->53622 53620 40ed8e 53619->53620 54011 40da6f 53620->54011 53621 40ef8c 53623 401e65 22 API calls 53621->53623 53625 40ee24 53622->53625 53626 40efb1 53623->53626 53630 401e65 22 API calls 53625->53630 53631 402093 28 API calls 53626->53631 53628 401f13 28 API calls 53629 40edad 53628->53629 53632 401f09 11 API calls 53629->53632 53633 40ee35 53630->53633 53634 40efc3 53631->53634 53632->53604 54069 40ce34 46 API calls _wcslen 53633->54069 53851 4137aa RegCreateKeyA 53634->53851 53841 413982 53635->53841 53640 40eede ctype 53644 401e65 22 API calls 53640->53644 53641 40ee45 53641->53635 53642 401e65 22 API calls 53643 40efe5 53642->53643 53646 43bb2c 40 API calls 53643->53646 53645 40eef5 53644->53645 53645->53621 53649 40ef09 53645->53649 53647 40eff2 53646->53647 53648 40effc 53647->53648 53651 40f01f 53647->53651 54074 41ce2c 88 API calls ___scrt_get_show_window_mode 53648->54074 53650 401e65 22 API calls 53649->53650 53652 40ef12 53650->53652 53654 402093 28 API calls 53651->53654 53655 41bcef 28 API calls 53652->53655 53657 40f034 53654->53657 53658 40ef1e 53655->53658 53656 40f003 CreateThread 53656->53651 54409 41d4ee 10 API calls 53656->54409 53659 402093 28 API calls 53657->53659 54070 40f4af 114 API calls 53658->54070 53661 40f043 53659->53661 53663 41b580 80 API calls 53661->53663 53662 40ef23 53662->53621 53664 40ef2a 53662->53664 53665 40f048 53663->53665 53664->53545 53666 401e65 22 API calls 53665->53666 53667 40f054 53666->53667 53668 401e65 22 API calls 53667->53668 53669 40f066 53668->53669 53670 401e65 22 API calls 53669->53670 53671 40f086 53670->53671 53672 43bb2c 40 API calls 53671->53672 53673 40f093 53672->53673 53674 401e65 22 API calls 53673->53674 53675 40f09e 53674->53675 53676 401e65 22 API calls 53675->53676 53677 40f0af 53676->53677 53678 401e65 22 API calls 53677->53678 53679 40f0c4 53678->53679 53680 401e65 22 API calls 53679->53680 53681 40f0d5 53680->53681 53682 40f0dc StrToIntA 53681->53682 53857 409e1f 53682->53857 53685 401e65 22 API calls 53686 40f0f7 53685->53686 53687 40f103 53686->53687 53688 40f13c 53686->53688 54075 43455e 53687->54075 53690 401e65 22 API calls 53688->53690 53692 40f14c 53690->53692 53696 40f194 53692->53696 53697 40f158 53692->53697 53693 401e65 22 API calls 53694 40f11f 53693->53694 53695 40f126 CreateThread 53694->53695 53695->53688 54412 41a045 113 API calls __EH_prolog 53695->54412 53698 401e65 22 API calls 53696->53698 53699 43455e new 22 API calls 53697->53699 53700 40f19d 53698->53700 53701 40f161 53699->53701 53704 40f207 53700->53704 53705 40f1a9 53700->53705 53702 401e65 22 API calls 53701->53702 53703 40f173 53702->53703 53708 40f17a CreateThread 53703->53708 53706 401e65 22 API calls 53704->53706 53707 401e65 22 API calls 53705->53707 53709 40f210 53706->53709 53710 40f1b9 53707->53710 53708->53696 54411 41a045 113 API calls __EH_prolog 53708->54411 53711 40f255 53709->53711 53712 40f21c 53709->53712 53713 401e65 22 API calls 53710->53713 53882 41b69e GetComputerNameExW GetUserNameW 53711->53882 53715 401e65 22 API calls 53712->53715 53716 40f1ce 53713->53716 53718 40f225 53715->53718 54082 40da23 53716->54082 53723 401e65 22 API calls 53718->53723 53719 401f13 28 API calls 53720 40f269 53719->53720 53722 401f09 11 API calls 53720->53722 53725 40f272 53722->53725 53726 40f23a 53723->53726 53729 40f27b SetProcessDEPPolicy 53725->53729 53730 40f27e CreateThread 53725->53730 53734 43bb2c 40 API calls 53726->53734 53727 401f13 28 API calls 53728 40f1ed 53727->53728 53731 401f09 11 API calls 53728->53731 53729->53730 53732 40f293 CreateThread 53730->53732 53733 40f29f 53730->53733 54380 40f7e2 53730->54380 53735 40f1f6 CreateThread 53731->53735 53732->53733 54407 412132 146 API calls 53732->54407 53736 40f2b4 53733->53736 53737 40f2a8 CreateThread 53733->53737 53738 40f247 53734->53738 53735->53704 54408 401be9 50 API calls 53735->54408 53739 40f307 53736->53739 53741 402093 28 API calls 53736->53741 53737->53736 54410 412716 38 API calls ___scrt_get_show_window_mode 53737->54410 54093 40c19d 7 API calls 53738->54093 53893 41353a RegOpenKeyExA 53739->53893 53742 40f2d7 53741->53742 54094 4052fd 28 API calls 53742->54094 53747 40f328 53749 41bcef 28 API calls 53747->53749 53751 40f338 53749->53751 54095 413656 31 API calls 53751->54095 53756 40f34e 53757 401f09 11 API calls 53756->53757 53760 40f359 53757->53760 53758 40f381 DeleteFileW 53759 40f388 53758->53759 53758->53760 53759->53567 53760->53567 53760->53758 53761 40f36f Sleep 53760->53761 53761->53760 53762->53440 53763->53444 53764->53451 53765->53447 53766->53457 53767->53458 53768->53460 53769->53463 53770->53467 53771->53469 53772->53471 53773->53474 53775 44f0eb 53774->53775 53776 44f0e2 53774->53776 53775->53482 53779 44efd8 49 API calls 4 library calls 53776->53779 53778->53482 53779->53775 53781 41cc20 LoadLibraryA GetProcAddress 53780->53781 53782 41cc10 GetModuleHandleA GetProcAddress 53780->53782 53783 41cc49 44 API calls 53781->53783 53784 41cc39 LoadLibraryA GetProcAddress 53781->53784 53782->53781 53783->53486 53784->53783 54098 41b539 FindResourceA 53785->54098 53788 43bda0 ___std_exception_copy 21 API calls 53789 40f428 ctype 53788->53789 53790 4020b7 28 API calls 53789->53790 53791 40f443 53790->53791 53792 401fe2 28 API calls 53791->53792 53793 40f44e 53792->53793 53794 401fd8 11 API calls 53793->53794 53795 40f457 53794->53795 53796 43bda0 ___std_exception_copy 21 API calls 53795->53796 53797 40f468 ctype 53796->53797 54101 406e13 53797->54101 53799 40f49b 53799->53488 53801 40fb5e 53800->53801 53803 40fb65 53800->53803 54104 402163 11 API calls 53801->54104 53803->53496 54105 401fab 53804->54105 53806 40d0ae CreateMutexA GetLastError 53806->53544 54106 41c048 53807->54106 53812 401fe2 28 API calls 53813 41b390 53812->53813 53814 401fd8 11 API calls 53813->53814 53815 41b398 53814->53815 53816 41b3ee 53815->53816 53817 4135e1 31 API calls 53815->53817 53816->53558 53818 41b3c1 53817->53818 53819 41b3cc StrToIntA 53818->53819 53820 41b3e3 53819->53820 53821 41b3da 53819->53821 53822 401fd8 11 API calls 53820->53822 54115 41cffa 22 API calls 53821->54115 53822->53816 53825 407765 53824->53825 53826 413584 3 API calls 53825->53826 53827 40776c 53826->53827 53827->53562 53827->53563 53829 41bd03 53828->53829 53830 40b93f 28 API calls 53829->53830 53831 41bd0b 53830->53831 53831->53579 53833 401f22 53832->53833 53840 401f6a 53832->53840 53834 402252 11 API calls 53833->53834 53835 401f2b 53834->53835 53836 401f6d 53835->53836 53838 401f46 53835->53838 54117 402336 53836->54117 54116 40305c 28 API calls 53838->54116 53840->53588 53842 4139a0 53841->53842 53843 406e13 28 API calls 53842->53843 53844 4139b5 53843->53844 53845 4020f6 28 API calls 53844->53845 53846 4139c5 53845->53846 53847 4137aa 14 API calls 53846->53847 53848 4139cf 53847->53848 53849 401fd8 11 API calls 53848->53849 53850 4139dc 53849->53850 53850->53640 53852 4137c3 53851->53852 53853 4137fa 53851->53853 53856 4137d5 RegSetValueExA RegCloseKey 53852->53856 53854 401fd8 11 API calls 53853->53854 53855 40efd9 53854->53855 53855->53642 53856->53853 53858 409e3d _wcslen 53857->53858 53859 409e48 53858->53859 53860 409e5f 53858->53860 53861 40da6f 32 API calls 53859->53861 53862 40da6f 32 API calls 53860->53862 53863 409e50 53861->53863 53864 409e67 53862->53864 53866 401f13 28 API calls 53863->53866 53865 401f13 28 API calls 53864->53865 53867 409e75 53865->53867 53868 409e5a 53866->53868 53869 401f09 11 API calls 53867->53869 53871 401f09 11 API calls 53868->53871 53870 409e7d 53869->53870 54136 409196 28 API calls 53870->54136 53873 409eb4 53871->53873 54121 40a144 53873->54121 53874 409e8f 54137 403014 53874->54137 53879 401f13 28 API calls 53880 409ea4 53879->53880 53881 401f09 11 API calls 53880->53881 53881->53868 53883 40417e 28 API calls 53882->53883 53884 41b6ed 53883->53884 54186 4042fc 53884->54186 53887 403014 28 API calls 53888 41b703 53887->53888 53889 401f09 11 API calls 53888->53889 53890 41b70c 53889->53890 53891 401f09 11 API calls 53890->53891 53892 40f25e 53891->53892 53892->53719 53894 41355b RegQueryValueExA RegCloseKey 53893->53894 53895 40f31f 53893->53895 53894->53895 53895->53592 53895->53747 53897 40f3cd 53896->53897 53898 413a7a RegDeleteValueW 53896->53898 53897->53584 53898->53897 53900 40dd96 53899->53900 53901 41353a 3 API calls 53900->53901 53902 40dd9d 53901->53902 53903 40ddbc 53902->53903 54261 401707 53902->54261 53907 414f65 53903->53907 53905 40ddaa 54264 4138b2 RegCreateKeyA 53905->54264 53908 4020df 11 API calls 53907->53908 53909 414f79 53908->53909 54278 41b944 53909->54278 53912 4020df 11 API calls 53913 414f8f 53912->53913 53914 401e65 22 API calls 53913->53914 53915 414f9d 53914->53915 53916 43bb2c 40 API calls 53915->53916 53917 414faa 53916->53917 53918 414fbc 53917->53918 53919 414faf Sleep 53917->53919 53920 402093 28 API calls 53918->53920 53919->53918 53921 414fcb 53920->53921 53922 401e65 22 API calls 53921->53922 53923 414fd4 53922->53923 53924 4020f6 28 API calls 53923->53924 53925 414fdf 53924->53925 53926 41beac 28 API calls 53925->53926 53927 414fe7 53926->53927 54282 40489e WSAStartup 53927->54282 53929 414ff1 53930 401e65 22 API calls 53929->53930 53931 414ffa 53930->53931 53932 401e65 22 API calls 53931->53932 53955 415079 53931->53955 53933 415013 53932->53933 53934 401e65 22 API calls 53933->53934 53935 415024 53934->53935 53937 401e65 22 API calls 53935->53937 53936 41beac 28 API calls 53936->53955 53938 415035 53937->53938 53940 401e65 22 API calls 53938->53940 53939 406c59 28 API calls 53939->53955 53941 415046 53940->53941 53942 401e65 22 API calls 53941->53942 53944 415057 53942->53944 53943 401fe2 28 API calls 53943->53955 53945 401e65 22 API calls 53944->53945 53946 415069 53945->53946 54308 40473d 89 API calls 53946->54308 53948 40531e 28 API calls 53948->53955 53950 4151c7 WSAGetLastError 54309 41cb72 30 API calls 53950->54309 53951 40482d 3 API calls 53951->53955 53954 404f51 105 API calls 53954->53955 53955->53936 53955->53939 53955->53943 53955->53948 53955->53950 53955->53951 53955->53954 53956 4048c8 97 API calls 53955->53956 53957 401e65 22 API calls 53955->53957 53958 404e26 99 API calls 53955->53958 53959 401e8d 11 API calls 53955->53959 53961 415a6e 53955->53961 53964 402093 28 API calls 53955->53964 53965 41b580 80 API calls 53955->53965 53968 409097 28 API calls 53955->53968 53969 441ed1 20 API calls 53955->53969 53970 4020f6 28 API calls 53955->53970 53971 413733 3 API calls 53955->53971 53972 4135e1 31 API calls 53955->53972 53973 40417e 28 API calls 53955->53973 53976 41bdaf 28 API calls 53955->53976 53977 41bc1f 28 API calls 53955->53977 53978 401e65 22 API calls 53955->53978 53982 41bb27 30 API calls 53955->53982 53984 402f31 28 API calls 53955->53984 53985 406383 28 API calls 53955->53985 53986 402ea1 28 API calls 53955->53986 53987 402f10 28 API calls 53955->53987 53988 404aa1 61 API calls 53955->53988 53989 401fd8 11 API calls 53955->53989 53990 404c10 265 API calls 53955->53990 53992 415aac CreateThread 53955->53992 53993 401f09 11 API calls 53955->53993 54283 414f24 53955->54283 54289 41b871 53955->54289 54292 4145f8 53955->54292 54295 40ddc4 53955->54295 54301 41bcd3 53955->54301 54304 41bb77 GetLastInputInfo GetTickCount 53955->54304 54305 40f90c GetLocaleInfoA 53955->54305 54310 4052fd 28 API calls 53955->54310 53956->53955 53957->53955 53958->53955 53959->53955 53960 401e65 22 API calls 53960->53961 53961->53960 53962 43bb2c 40 API calls 53961->53962 54311 40b08c 85 API calls 53961->54311 53963 415b0a Sleep 53962->53963 53963->53955 53964->53955 53965->53955 53968->53955 53969->53955 53970->53955 53971->53955 53972->53955 53973->53955 53976->53955 53977->53955 53979 415474 GetTickCount 53978->53979 53980 41bc1f 28 API calls 53979->53980 53980->53955 53982->53955 53984->53955 53985->53955 53986->53955 53987->53955 53988->53955 53989->53955 53990->53955 53992->53955 54352 41ada8 106 API calls 53992->54352 53993->53955 53994->53504 53995->53512 53996->53516 53999 4020df 11 API calls 53998->53999 54000 406c65 53999->54000 54001 4032a0 28 API calls 54000->54001 54002 406c82 54001->54002 54002->53537 54004 40ebdf 54003->54004 54005 4135ae RegQueryValueExA RegCloseKey 54003->54005 54004->53534 54004->53550 54005->54004 54006->53556 54007->53570 54008->53562 54009->53552 54010->53569 54353 401f86 54011->54353 54014 40dae0 54017 41c048 2 API calls 54014->54017 54015 40daab 54372 41b645 29 API calls 54015->54372 54016 40daa1 54019 40dbd4 GetLongPathNameW 54016->54019 54020 40dae5 54017->54020 54022 40417e 28 API calls 54019->54022 54024 40dae9 54020->54024 54025 40db3b 54020->54025 54021 40dab4 54026 401f13 28 API calls 54021->54026 54023 40dbe9 54022->54023 54027 40417e 28 API calls 54023->54027 54029 40417e 28 API calls 54024->54029 54028 40417e 28 API calls 54025->54028 54063 40dabe 54026->54063 54030 40dbf8 54027->54030 54031 40db49 54028->54031 54032 40daf7 54029->54032 54357 40de0c 54030->54357 54037 40417e 28 API calls 54031->54037 54038 40417e 28 API calls 54032->54038 54034 401f09 11 API calls 54034->54016 54040 40db5f 54037->54040 54041 40db0d 54038->54041 54043 402fa5 28 API calls 54040->54043 54044 402fa5 28 API calls 54041->54044 54042 402fa5 28 API calls 54045 40dc20 54042->54045 54046 40db6a 54043->54046 54047 40db18 54044->54047 54048 401f09 11 API calls 54045->54048 54049 401f13 28 API calls 54046->54049 54050 401f13 28 API calls 54047->54050 54051 40dc2a 54048->54051 54052 40db75 54049->54052 54053 40db23 54050->54053 54054 401f09 11 API calls 54051->54054 54055 401f09 11 API calls 54052->54055 54056 401f09 11 API calls 54053->54056 54057 40dc33 54054->54057 54058 40db7e 54055->54058 54059 40db2c 54056->54059 54061 401f09 11 API calls 54057->54061 54062 401f09 11 API calls 54058->54062 54060 401f09 11 API calls 54059->54060 54060->54063 54064 40dc3c 54061->54064 54062->54063 54063->54034 54065 401f09 11 API calls 54064->54065 54066 40dc45 54065->54066 54067 401f09 11 API calls 54066->54067 54068 40dc4e 54067->54068 54068->53628 54069->53641 54070->53662 54072 413759 RegQueryValueExA RegCloseKey 54071->54072 54073 41377d 54071->54073 54072->54073 54073->53621 54074->53656 54079 434563 54075->54079 54076 43bda0 ___std_exception_copy 21 API calls 54076->54079 54077 40f10c 54077->53693 54079->54076 54079->54077 54377 443001 7 API calls 2 library calls 54079->54377 54378 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54079->54378 54379 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 54079->54379 54083 402093 28 API calls 54082->54083 54084 40da3a 54083->54084 54085 41bcef 28 API calls 54084->54085 54086 40da45 54085->54086 54087 40da6f 32 API calls 54086->54087 54088 40da56 54087->54088 54089 401f09 11 API calls 54088->54089 54090 40da5f 54089->54090 54091 401fd8 11 API calls 54090->54091 54092 40da67 54091->54092 54092->53727 54093->53711 54095->53756 54096->53561 54099 41b556 LoadResource LockResource SizeofResource 54098->54099 54100 40f419 54098->54100 54099->54100 54100->53788 54102 4020b7 28 API calls 54101->54102 54103 406e27 54102->54103 54103->53799 54104->53803 54107 41b362 54106->54107 54108 41c055 GetCurrentProcess IsWow64Process 54106->54108 54110 4135e1 RegOpenKeyExA 54107->54110 54108->54107 54109 41c06c 54108->54109 54109->54107 54111 41360f RegQueryValueExA RegCloseKey 54110->54111 54112 413639 54110->54112 54111->54112 54113 402093 28 API calls 54112->54113 54114 41364e 54113->54114 54114->53812 54115->53820 54116->53840 54118 402347 54117->54118 54119 402252 11 API calls 54118->54119 54120 4023c7 54119->54120 54120->53840 54122 40a162 54121->54122 54123 413584 3 API calls 54122->54123 54124 40a169 54123->54124 54125 40a197 54124->54125 54126 40a17d 54124->54126 54129 409097 28 API calls 54125->54129 54127 40a182 54126->54127 54128 409ed6 54126->54128 54142 409097 54127->54142 54128->53685 54131 40a1a5 54129->54131 54149 40a1b4 86 API calls 54131->54149 54135 40a195 54135->54128 54136->53874 54154 403222 54137->54154 54139 403022 54158 403262 54139->54158 54143 4090ad 54142->54143 54144 402252 11 API calls 54143->54144 54145 4090c7 54144->54145 54146 404267 28 API calls 54145->54146 54147 4090d5 54146->54147 54148 40a268 29 API calls 54147->54148 54148->54135 54150 40a2ae 164 API calls 54148->54150 54149->54128 54151 40a2a2 86 API calls 54149->54151 54152 40a2c4 49 API calls 54149->54152 54153 40a2b8 129 API calls 54149->54153 54155 40322e 54154->54155 54164 403618 54155->54164 54157 40323b 54157->54139 54159 40326e 54158->54159 54160 402252 11 API calls 54159->54160 54161 403288 54160->54161 54162 402336 11 API calls 54161->54162 54163 403031 54162->54163 54163->53879 54165 403626 54164->54165 54166 403644 54165->54166 54167 40362c 54165->54167 54168 40365c 54166->54168 54169 40369e 54166->54169 54175 4036a6 54167->54175 54173 4027e6 28 API calls 54168->54173 54174 403642 54168->54174 54184 4028a4 22 API calls 54169->54184 54173->54174 54174->54157 54176 402888 22 API calls 54175->54176 54177 4036b9 54176->54177 54178 40372c 54177->54178 54179 4036de 54177->54179 54185 4028a4 22 API calls 54178->54185 54182 4027e6 28 API calls 54179->54182 54183 4036f0 54179->54183 54182->54183 54183->54174 54191 404353 54186->54191 54188 40430a 54189 403262 11 API calls 54188->54189 54190 404319 54189->54190 54190->53887 54192 40435f 54191->54192 54195 404371 54192->54195 54194 40436d 54194->54188 54196 40437f 54195->54196 54197 404385 54196->54197 54198 40439e 54196->54198 54259 4034e6 28 API calls 54197->54259 54199 402888 22 API calls 54198->54199 54200 4043a6 54199->54200 54202 404419 54200->54202 54203 4043bf 54200->54203 54260 4028a4 22 API calls 54202->54260 54205 4027e6 28 API calls 54203->54205 54215 40439c 54203->54215 54205->54215 54215->54194 54259->54215 54267 43ab1a 54261->54267 54265 4138f4 54264->54265 54266 4138ca RegSetValueExA RegCloseKey 54264->54266 54265->53903 54266->54265 54270 43aa9b 54267->54270 54269 40170d 54269->53905 54271 43aaaa 54270->54271 54272 43aabe 54270->54272 54276 44062d 20 API calls __dosmaperr 54271->54276 54275 43aaaf pre_c_initialization __alldvrm 54272->54275 54277 4489d7 11 API calls 2 library calls 54272->54277 54275->54269 54276->54275 54277->54275 54279 41b98a ctype ___scrt_get_show_window_mode 54278->54279 54280 402093 28 API calls 54279->54280 54281 414f84 54280->54281 54281->53912 54282->53929 54284 414f33 54283->54284 54285 414f3d WSASetLastError 54283->54285 54312 414dc1 29 API calls ___std_exception_copy 54284->54312 54285->53955 54287 414f38 54287->54285 54313 41b847 GlobalMemoryStatusEx 54289->54313 54291 41b886 54291->53955 54314 4145bb 54292->54314 54296 40dde0 54295->54296 54297 41353a 3 API calls 54296->54297 54299 40dde7 54297->54299 54298 40ddff 54298->53955 54299->54298 54300 413584 3 API calls 54299->54300 54300->54298 54302 4020b7 28 API calls 54301->54302 54303 41bce8 54302->54303 54303->53955 54304->53955 54306 402093 28 API calls 54305->54306 54307 40f931 54306->54307 54307->53955 54308->53955 54309->53955 54311->53955 54312->54287 54313->54291 54317 41458e 54314->54317 54318 4145a3 ___scrt_initialize_default_local_stdio_options 54317->54318 54321 43f7ed 54318->54321 54324 43c540 54321->54324 54325 43c580 54324->54325 54326 43c568 54324->54326 54325->54326 54327 43c588 54325->54327 54346 44062d 20 API calls __dosmaperr 54326->54346 54347 43a837 36 API calls 2 library calls 54327->54347 54330 43c56d pre_c_initialization 54339 43502b 54330->54339 54331 43c598 54348 43ccc6 20 API calls 2 library calls 54331->54348 54334 43c610 54349 43d334 51 API calls 3 library calls 54334->54349 54335 4145b1 54335->53955 54338 43c61b 54350 43cd30 20 API calls _free 54338->54350 54340 435036 IsProcessorFeaturePresent 54339->54340 54341 435034 54339->54341 54343 435078 54340->54343 54341->54335 54351 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 54343->54351 54345 43515b 54345->54335 54346->54330 54347->54331 54348->54334 54349->54338 54350->54330 54351->54345 54354 401f8e 54353->54354 54355 402252 11 API calls 54354->54355 54356 401f99 54355->54356 54356->54014 54356->54015 54356->54016 54358 40de14 54357->54358 54359 402252 11 API calls 54358->54359 54360 40de1f 54359->54360 54361 4041d9 28 API calls 54360->54361 54362 40dc0b 54361->54362 54363 402fa5 54362->54363 54367 402fb4 54363->54367 54364 402ff6 54374 40323f 54364->54374 54366 402ff4 54368 403262 11 API calls 54366->54368 54367->54364 54370 402feb 54367->54370 54369 40300d 54368->54369 54369->54042 54373 403211 28 API calls 54370->54373 54372->54021 54373->54366 54375 4036a6 28 API calls 54374->54375 54376 40324c 54375->54376 54376->54366 54377->54079 54382 40f7fd 54380->54382 54381 413584 3 API calls 54381->54382 54382->54381 54383 40f82f 54382->54383 54385 40f8a1 54382->54385 54387 40f891 Sleep 54382->54387 54384 409097 28 API calls 54383->54384 54383->54387 54389 41bcef 28 API calls 54383->54389 54395 401f09 11 API calls 54383->54395 54398 402093 28 API calls 54383->54398 54402 4137aa 14 API calls 54383->54402 54413 40d0d1 112 API calls ___scrt_get_show_window_mode 54383->54413 54414 41384f 14 API calls 54383->54414 54384->54383 54386 409097 28 API calls 54385->54386 54390 40f8ac 54386->54390 54387->54382 54389->54383 54391 41bcef 28 API calls 54390->54391 54392 40f8b8 54391->54392 54415 41384f 14 API calls 54392->54415 54395->54383 54396 40f8cb 54397 401f09 11 API calls 54396->54397 54399 40f8d7 54397->54399 54398->54383 54400 402093 28 API calls 54399->54400 54401 40f8e8 54400->54401 54403 4137aa 14 API calls 54401->54403 54402->54383 54404 40f8fb 54403->54404 54416 41288b TerminateProcess WaitForSingleObject 54404->54416 54406 40f903 ExitProcess 54417 412829 62 API calls 54407->54417 54414->54383 54415->54396 54416->54406 54418 40165e 54419 401666 54418->54419 54420 401669 54418->54420 54421 4016a8 54420->54421 54423 401696 54420->54423 54422 43455e new 22 API calls 54421->54422 54424 40169c 54422->54424 54425 43455e new 22 API calls 54423->54425 54425->54424

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                                                    • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                                                    • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                                                    • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                                                    • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                                                    • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                                                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                                                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                                                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                                                    • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                                                                                    • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                                                                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                                                                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressProc$LibraryLoad$HandleModule
                                                                                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                    • API String ID: 4236061018-3687161714
                                                                                    • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                                    • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                                                                    • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                                    • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 448 41812a-418153 449 418157-4181be GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 4181c4-4181cb 449->450 451 4184bb 449->451 450->451 452 4181d1-4181d8 450->452 453 4184bd-4184c7 451->453 452->451 454 4181de-4181e0 452->454 454->451 455 4181e6-418213 call 436f10 * 2 454->455 455->451 460 418219-418224 455->460 460->451 461 41822a-41825a CreateProcessW 460->461 462 418260-418288 VirtualAlloc Wow64GetThreadContext 461->462 463 4184b5 GetLastError 461->463 464 41847f-4184b3 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->464 465 41828e-4182ae ReadProcessMemory 462->465 463->451 464->451 465->464 466 4182b4-4182d6 NtCreateSection 465->466 466->464 467 4182dc-4182e9 466->467 468 4182eb-4182f6 NtUnmapViewOfSection 467->468 469 4182fc-41831e NtMapViewOfSection 467->469 468->469 470 418320-41835d VirtualFree NtClose TerminateProcess 469->470 471 418368-41838f GetCurrentProcess NtMapViewOfSection 469->471 470->449 472 418363 470->472 471->464 473 418395-418399 471->473 472->451 474 4183a2-4183c0 call 436990 473->474 475 41839b-41839f 473->475 478 418402-41840b 474->478 479 4183c2-4183d0 474->479 475->474 480 41842b-41842f 478->480 481 41840d-418413 478->481 482 4183d2-4183f5 call 436990 479->482 484 418431-41844e WriteProcessMemory 480->484 485 418454-41846b Wow64SetThreadContext 480->485 481->480 483 418415-418428 call 41853e 481->483 493 4183f7-4183fe 482->493 483->480 484->464 488 418450 484->488 485->464 489 41846d-418479 ResumeThread 485->489 488->485 489->464 492 41847b-41847d 489->492 492->453 493->478
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                                                    • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                                                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                                                                    • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004182CE
                                                                                    • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182F6
                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418316
                                                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00418328
                                                                                    • NtClose.NTDLL(?), ref: 00418332
                                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                                                                    • NtMapViewOfSection.NTDLL(?,00000000), ref: 00418387
                                                                                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                                                                    • ResumeThread.KERNEL32(?), ref: 00418470
                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                                                                    • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                                                                    • NtUnmapViewOfSection.NTDLL(00000000), ref: 00418499
                                                                                    • NtClose.NTDLL(?), ref: 004184A3
                                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                                                                    • GetLastError.KERNEL32 ref: 004184B5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                                                                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                    • API String ID: 3150337530-3035715614
                                                                                    • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                                    • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                                                                    • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                                    • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1460 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1467 10001177-1000119e lstrlenW FindFirstFileW 1460->1467 1468 10001168-10001172 lstrlenW 1460->1468 1469 100011a0-100011a8 1467->1469 1470 100011e1-100011e9 1467->1470 1468->1467 1471 100011c7-100011d8 FindNextFileW 1469->1471 1472 100011aa-100011c4 call 10001000 1469->1472 1471->1469 1474 100011da-100011db FindClose 1471->1474 1472->1471 1474->1470
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                    • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                    • String ID:
                                                                                    • API String ID: 1083526818-0
                                                                                    • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                    • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                    • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                    • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                                                                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                                                                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                                                                    Strings
                                                                                    • http://geoplugin.net/json.gp, xrefs: 0041B448
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Internet$CloseHandleOpen$FileRead
                                                                                    • String ID: http://geoplugin.net/json.gp
                                                                                    • API String ID: 3121278467-91888290
                                                                                    • Opcode ID: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                                                                                    • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                                                                    • Opcode Fuzzy Hash: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                                                                                    • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1521 411d39-411d59 call 4117d7 1524 411d62-411d6b 1521->1524 1525 411d5b-411d5d 1521->1525 1527 411d7a-411d8c call 4117d7 1524->1527 1528 411d6d-411d78 SetLastError 1524->1528 1526 411f75-411f7b 1525->1526 1527->1525 1531 411d8e-411d99 1527->1531 1528->1525 1531->1528 1532 411d9b-411da4 1531->1532 1532->1528 1533 411da6-411daa 1532->1533 1533->1528 1534 411dac-411db6 1533->1534 1535 411db8-411dbb 1534->1535 1536 411dda-411dfd GetNativeSystemInfo call 4117c6 * 2 1534->1536 1538 411dbd-411dc3 1535->1538 1545 411e0f-411e29 call 411cde 1536->1545 1546 411dff 1536->1546 1540 411dc5-411dc8 1538->1540 1541 411dca 1538->1541 1542 411dcd-411dd8 1540->1542 1541->1542 1542->1536 1542->1538 1552 411e47-411e5c GetProcessHeap HeapAlloc 1545->1552 1553 411e2b-411e41 call 411cde 1545->1553 1547 411e04-411e0a SetLastError 1546->1547 1549 411f72 1547->1549 1551 411f74 1549->1551 1551->1526 1554 411e70-411ebb call 4117d7 1552->1554 1555 411e5e-411e6e call 411cf5 1552->1555 1553->1552 1562 411e43-411e45 1553->1562 1563 411ec1-411f03 call 411cde call 436990 call 4117ea 1554->1563 1564 411f6b-411f6d call 4120b2 1554->1564 1555->1562 1562->1547 1563->1564 1572 411f05-411f0d 1563->1572 1564->1549 1573 411f0f-411f1c call 411aee 1572->1573 1574 411f1e-411f21 1572->1574 1575 411f24-411f2d call 411b9a 1573->1575 1574->1575 1575->1564 1580 411f2f-411f31 call 41198a 1575->1580 1582 411f36-411f38 1580->1582 1582->1564 1583 411f3a-411f43 call 411abd 1582->1583 1583->1564 1586 411f45-411f4c 1583->1586 1587 411f86 1586->1587 1588 411f4e-411f54 1586->1588 1589 411f8a-411f8c 1587->1589 1590 411f81-411f84 1588->1590 1591 411f56-411f5e 1588->1591 1589->1551 1590->1589 1593 411f60-411f65 SetLastError 1591->1593 1594 411f7c-411f7f 1591->1594 1593->1564 1594->1589
                                                                                    APIs
                                                                                      • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                                                                    • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                                                                    • GetNativeSystemInfo.KERNEL32(?,0040D2DD,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                                                                                    • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                                                                                      • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                                    • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                                                                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                                                                                    • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                                                                                      • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                                                      • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 3950776272-0
                                                                                    • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                                    • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                                                                    • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                                    • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                                      • Part of subcall function 00413584: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                                                                                      • Part of subcall function 00413584: RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                                    • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                                                                    • ExitProcess.KERNEL32 ref: 0040F905
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                    • String ID: 5.1.2 Pro$override$pth_unenc
                                                                                    • API String ID: 2281282204-3554326054
                                                                                    • Opcode ID: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                                                                                    • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                                                                    • Opcode Fuzzy Hash: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                                                                                    • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                                                                                    APIs
                                                                                    • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404F81
                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404FCD
                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                                    Strings
                                                                                    • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Create$EventLocalThreadTime
                                                                                    • String ID: KeepAlive | Enabled | Timeout:
                                                                                    • API String ID: 2532271599-1507639952
                                                                                    • Opcode ID: 428bc55d4a31c43cbc360544c684b23c3ac7d4a2dd682b4fcf6922528a401838
                                                                                    • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                                                                    • Opcode Fuzzy Hash: 428bc55d4a31c43cbc360544c684b23c3ac7d4a2dd682b4fcf6922528a401838
                                                                                    • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                                                                    APIs
                                                                                    • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B6BB
                                                                                    • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Name$ComputerUser
                                                                                    • String ID:
                                                                                    • API String ID: 4229901323-0
                                                                                    • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                                    • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                                                                    • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                                    • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                                                                    APIs
                                                                                    • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.2 Pro), ref: 0040F920
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 2299586839-0
                                                                                    • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                    • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                                    • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                    • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 100 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->100 79 40ec06-40ec25 call 401fab call 413584 70->79 80 40ec3e-40ec45 call 40d0a4 70->80 79->80 99 40ec27-40ec3d call 401fab call 4139e4 79->99 89 40ec47-40ec49 80->89 90 40ec4e-40ec55 80->90 93 40ef2c 89->93 94 40ec57 90->94 95 40ec59-40ec65 call 41b354 90->95 93->49 94->95 104 40ec67-40ec69 95->104 105 40ec6e-40ec72 95->105 99->80 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 100->126 104->105 107 40ecb1-40ecc4 call 401e65 call 401fab 105->107 108 40ec74 call 407751 105->108 127 40ecc6 call 407790 107->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->128 117 40ec79-40ec7b 108->117 120 40ec87-40ec9a call 401e65 call 401fab 117->120 121 40ec7d-40ec82 call 407773 call 40729b 117->121 120->107 141 40ec9c-40eca2 120->141 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 126->157 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 141->107 144 40eca4-40ecaa 141->144 144->107 147 40ecac call 40729b 144->147 147->107 177->178 204 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->204 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 234 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->234 183 40ee4a-40ee54 call 409092 181->183 184 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->184 190 40ee59-40ee7d call 40247c call 434829 183->190 184->190 211 40ee8c 190->211 212 40ee7f-40ee8a call 436f10 190->212 204->178 218 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 211->218 212->218 272 40eede-40ef03 call 434832 call 401e65 call 40b9f8 218->272 286 40f017-40f019 234->286 287 40effc 234->287 272->234 288 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 272->288 291 40f01b-40f01d 286->291 292 40f01f 286->292 290 40effe-40f015 call 41ce2c CreateThread 287->290 288->234 306 40ef2a 288->306 293 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 290->293 291->290 292->293 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 293->344 345 40f13c 293->345 306->93 346 40f13e-40f156 call 401e65 call 401fab 344->346 345->346 357 40f194-40f1a7 call 401e65 call 401fab 346->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 346->358 367 40f207-40f21a call 401e65 call 401fab 357->367 368 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->368 358->357 379 40f255-40f279 call 41b69e call 401f13 call 401f09 367->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 367->380 368->367 401 40f27b-40f27c SetProcessDEPPolicy 379->401 402 40f27e-40f291 CreateThread 379->402 380->379 401->402 406 40f293-40f29d CreateThread 402->406 407 40f29f-40f2a6 402->407 406->407 410 40f2b4-40f2bb 407->410 411 40f2a8-40f2b2 CreateThread 407->411 412 40f2c9 410->412 413 40f2bd-40f2c0 410->413 411->410 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f31a call 401fab call 41353a 413->416 415->418 425 40f31f-40f322 416->425 418->416 425->157 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 425->427 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                                                                    APIs
                                                                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                                                      • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                                      • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                                                      • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000104), ref: 0040EA29
                                                                                      • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                    • String ID: 8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$Exe$Exe$Inj$PSG$Remcos Agent initialized$Rmc-9XV80Z$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                                    • API String ID: 2830904901-654658815
                                                                                    • Opcode ID: 1ef5b7d803f19f36c27cfa4c3c688568fcd5b6882c3006592bcd47f55126cf3d
                                                                                    • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                                                                    • Opcode Fuzzy Hash: 1ef5b7d803f19f36c27cfa4c3c688568fcd5b6882c3006592bcd47f55126cf3d
                                                                                    • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 494 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 507 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 494->507 508 414faf-414fb6 Sleep 494->508 523 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->523 524 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->524 508->507 523->524 577 415127-41512e 524->577 578 415119-415125 524->578 579 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 577->579 578->579 606 415210-41521e call 40482d 579->606 607 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 579->607 612 415220-415246 call 402093 * 2 call 41b580 606->612 613 41524b-415260 call 404f51 call 4048c8 606->613 630 415ade-415af0 call 404e26 call 4021fa 607->630 612->630 629 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 613->629 613->630 694 4153bb-4153c8 call 405aa6 629->694 695 4153cd-4153f4 call 401fab call 4135e1 629->695 643 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 630->643 644 415b18-415b20 call 401e8d 630->644 643->644 644->524 694->695 701 4153f6-4153f8 695->701 702 4153fb-415a45 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 call 41bdaf * 5 call 40f90c call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 695->702 701->702 947 415a4a-415a51 702->947 948 415a53-415a5a 947->948 949 415a65-415a6c 947->949 948->949 952 415a5c-415a5e 948->952 950 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 949->950 951 415a6e-415a73 call 40b08c 949->951 963 415aac-415ab8 CreateThread 950->963 964 415abe-415ad9 call 401fd8 * 2 call 401f09 950->964 951->950 952->949 963->964 964->630
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414FB6
                                                                                    • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                                                                                    • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                                                                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Sleep$ErrorLastLocalTime
                                                                                    • String ID: | $%I64u$5.1.2 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$Rmc-9XV80Z$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                                                                                    • API String ID: 524882891-2079785089
                                                                                    • Opcode ID: d9f3de951fffe6d7c8e0f4a2b63c330b2a21e4469b8104734da7c013fc89b48c
                                                                                    • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                                                                                    • Opcode Fuzzy Hash: d9f3de951fffe6d7c8e0f4a2b63c330b2a21e4469b8104734da7c013fc89b48c
                                                                                    • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 971 412aef-412b38 GetModuleFileNameW call 4020df * 3 978 412b3a-412bc4 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 971->978 1003 412bc6-412c56 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 978->1003 1026 412c66 1003->1026 1027 412c58-412c60 Sleep 1003->1027 1028 412c68-412cf8 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1026->1028 1027->1003 1027->1026 1051 412d08 1028->1051 1052 412cfa-412d02 Sleep 1028->1052 1053 412d0a-412d9a call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1051->1053 1052->1028 1052->1051 1076 412daa-412dcf 1053->1076 1077 412d9c-412da4 Sleep 1053->1077 1078 412dd3-412def call 401f04 call 41c516 1076->1078 1077->1053 1077->1076 1083 412df1-412e00 call 401f04 DeleteFileW 1078->1083 1084 412e06-412e22 call 401f04 call 41c516 1078->1084 1083->1084 1091 412e24-412e3d call 401f04 DeleteFileW 1084->1091 1092 412e3f 1084->1092 1094 412e43-412e5f call 401f04 call 41c516 1091->1094 1092->1094 1100 412e61-412e73 call 401f04 DeleteFileW 1094->1100 1101 412e79-412e7b 1094->1101 1100->1101 1102 412e88-412e93 Sleep 1101->1102 1103 412e7d-412e7f 1101->1103 1102->1078 1106 412e99-412eab call 406b63 1102->1106 1103->1102 1105 412e81-412e86 1103->1105 1105->1102 1105->1106 1110 412f01-412f20 call 401f09 * 3 1106->1110 1111 412ead-412ebb call 406b63 1106->1111 1122 412f25-412f89 call 40b93f call 401f04 call 4020f6 call 413268 call 401f09 call 405b05 1110->1122 1111->1110 1117 412ebd-412ecb call 406b63 1111->1117 1117->1110 1123 412ecd-412ef9 Sleep call 401f09 * 3 1117->1123 1143 4130e3-41318c call 41bdaf call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 1122->1143 1144 412f8f-4130de call 41bdaf call 41bc1f call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1122->1144 1123->978 1137 412eff 1123->1137 1137->1122 1183 413191-4131dc call 401fd8 * 7 1143->1183 1213 4131e0-413267 call 401fd8 call 401f09 call 401fd8 * 9 1144->1213 1183->1213
                                                                                    APIs
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                                                                      • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                      • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                                                      • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                                                    • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                                                                    • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                                                                    • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                                                                    • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                                                                    • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                                                                    • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                                                                    • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                                                                    • Sleep.KERNEL32(00000064), ref: 00412ECF
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                    • String ID: /stext "$0TG$0TG$NG$NG
                                                                                    • API String ID: 1223786279-2576077980
                                                                                    • Opcode ID: 591df7d2402dc93a9282f827ce4857207a20b6a107ae3b31e07142e6916c6a19
                                                                                    • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                                                                    • Opcode Fuzzy Hash: 591df7d2402dc93a9282f827ce4857207a20b6a107ae3b31e07142e6916c6a19
                                                                                    • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                      • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                      • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                      • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                      • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                    • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                    • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                    • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                    • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                    • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                    • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                    • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                    • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                    • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                    • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                    • String ID: )$Foxmail$ProgramFiles
                                                                                    • API String ID: 672098462-2938083778
                                                                                    • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                    • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                    • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                    • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1286 4048c8-4048e8 connect 1287 404a1b-404a1f 1286->1287 1288 4048ee-4048f1 1286->1288 1291 404a21-404a2f WSAGetLastError 1287->1291 1292 404a97 1287->1292 1289 404a17-404a19 1288->1289 1290 4048f7-4048fa 1288->1290 1293 404a99-404a9e 1289->1293 1294 404926-404930 call 420cf1 1290->1294 1295 4048fc-404923 call 40531e call 402093 call 41b580 1290->1295 1291->1292 1296 404a31-404a34 1291->1296 1292->1293 1308 404941-40494e call 420f20 1294->1308 1309 404932-40493c 1294->1309 1295->1294 1298 404a71-404a76 1296->1298 1299 404a36-404a6f call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 1296->1299 1301 404a7b-404a94 call 402093 * 2 call 41b580 1298->1301 1299->1292 1301->1292 1318 404950-404973 call 402093 * 2 call 41b580 1308->1318 1319 404987-404992 call 421ad1 1308->1319 1309->1301 1348 404976-404982 call 420d31 1318->1348 1331 4049c4-4049d1 call 420e97 1319->1331 1332 404994-4049c2 call 402093 * 2 call 41b580 call 421143 1319->1332 1345 4049d3-4049f6 call 402093 * 2 call 41b580 1331->1345 1346 4049f9-404a14 CreateEventW * 2 1331->1346 1332->1348 1345->1346 1346->1289 1348->1292
                                                                                    APIs
                                                                                    • connect.WS2_32(FFFFFFFF,00B4CC78,00000010), ref: 004048E0
                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                                    • WSAGetLastError.WS2_32 ref: 00404A21
                                                                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                    • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                    • API String ID: 994465650-2151626615
                                                                                    • Opcode ID: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                                                                                    • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                                                                    • Opcode Fuzzy Hash: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                                                                                    • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                                                    • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                                                                                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                    • String ID:
                                                                                    • API String ID: 3658366068-0
                                                                                    • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                                    • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                                                                    • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                                    • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1378 40da6f-40da94 call 401f86 1381 40da9a 1378->1381 1382 40dbbe-40dc56 call 401f04 GetLongPathNameW call 40417e * 2 call 40de0c call 402fa5 * 2 call 401f09 * 5 1378->1382 1383 40dae0-40dae7 call 41c048 1381->1383 1384 40daa1-40daa6 1381->1384 1385 40db93-40db98 1381->1385 1386 40dad6-40dadb 1381->1386 1387 40dba9 1381->1387 1388 40db9a-40db9f call 43c11f 1381->1388 1389 40daab-40dab9 call 41b645 call 401f13 1381->1389 1390 40dacc-40dad1 1381->1390 1391 40db8c-40db91 1381->1391 1404 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1383->1404 1405 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1383->1405 1393 40dbae-40dbb3 call 43c11f 1384->1393 1385->1393 1386->1393 1387->1393 1399 40dba4-40dba7 1388->1399 1412 40dabe 1389->1412 1390->1393 1391->1393 1406 40dbb4-40dbb9 call 409092 1393->1406 1399->1387 1399->1406 1417 40dac2-40dac7 call 401f09 1404->1417 1405->1412 1406->1382 1412->1417 1417->1382
                                                                                    APIs
                                                                                    • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LongNamePath
                                                                                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                    • API String ID: 82841172-425784914
                                                                                    • Opcode ID: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                                                                                    • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                                                                    • Opcode Fuzzy Hash: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                                                                                    • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1494 41b354-41b3ab call 41c048 call 4135e1 call 401fe2 call 401fd8 call 406b1c 1505 41b3ad-41b3bc call 4135e1 1494->1505 1506 41b3ee-41b3f7 1494->1506 1511 41b3c1-41b3d8 call 401fab StrToIntA 1505->1511 1507 41b400 1506->1507 1508 41b3f9-41b3fe 1506->1508 1510 41b405-41b410 call 40537d 1507->1510 1508->1510 1516 41b3e6-41b3e9 call 401fd8 1511->1516 1517 41b3da-41b3e3 call 41cffa 1511->1517 1516->1506 1517->1516
                                                                                    APIs
                                                                                      • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                      • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                      • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                      • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                                                      • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                    • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                                    • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                    • API String ID: 782494840-2070987746
                                                                                    • Opcode ID: 697c2019ecc49fbbbeb48104f1224f3a46b5ec4160ceda2913ffea691057c52c
                                                                                    • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                                                                    • Opcode Fuzzy Hash: 697c2019ecc49fbbbeb48104f1224f3a46b5ec4160ceda2913ffea691057c52c
                                                                                    • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1595 1000c7e6-1000c7ed GetModuleHandleA 1596 1000c82d 1595->1596 1597 1000c7ef-1000c7fe call 1000c803 1595->1597 1598 1000c82f-1000c833 1596->1598 1606 1000c800-1000c80b GetProcAddress 1597->1606 1607 1000c865 1597->1607 1600 1000c872 call 1000c877 1598->1600 1601 1000c835-1000c83d GetModuleHandleA 1598->1601 1604 1000c83f-1000c847 1601->1604 1604->1604 1608 1000c849-1000c84c 1604->1608 1606->1596 1610 1000c80d-1000c81a VirtualProtect 1606->1610 1609 1000c866-1000c86e 1607->1609 1608->1598 1611 1000c84e-1000c850 1608->1611 1617 1000c870 1609->1617 1613 1000c82c 1610->1613 1614 1000c81c-1000c82a VirtualProtect 1610->1614 1615 1000c852-1000c854 1611->1615 1616 1000c856-1000c85e 1611->1616 1613->1596 1614->1613 1618 1000c85f-1000c860 GetProcAddress 1615->1618 1616->1618 1617->1608 1618->1607
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                    • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                      • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                      • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                      • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 2099061454-0
                                                                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                    • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                    • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                      • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                      • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                      • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                      • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 2099061454-0
                                                                                    • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                    • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                    • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                    • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                    APIs
                                                                                    • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                    • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                    • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                    • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProcProtectVirtual$HandleModule
                                                                                    • String ID:
                                                                                    • API String ID: 2152742572-0
                                                                                    • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                    • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                    • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                    • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CountEventTick
                                                                                    • String ID: !D@$NG
                                                                                    • API String ID: 180926312-2721294649
                                                                                    • Opcode ID: e2a7bf6fb7709cd4b2e893843ede881ede8c3607d946f55507ab0d6306828070
                                                                                    • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                                                                    • Opcode Fuzzy Hash: e2a7bf6fb7709cd4b2e893843ede881ede8c3607d946f55507ab0d6306828070
                                                                                    • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                                                                    APIs
                                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                    • RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137E1
                                                                                    • RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137EC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateValue
                                                                                    • String ID: pth_unenc
                                                                                    • API String ID: 1818849710-4028850238
                                                                                    • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                                    • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                                                                    • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                                    • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                                                                    APIs
                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                                    • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00404DDB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                    • String ID:
                                                                                    • API String ID: 3360349984-0
                                                                                    • Opcode ID: b1d94ccb09ae88335c98018fba1659fd9f6643181a77e83682c5dcad394a06c0
                                                                                    • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                                                                    • Opcode Fuzzy Hash: b1d94ccb09ae88335c98018fba1659fd9f6643181a77e83682c5dcad394a06c0
                                                                                    • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C568
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041C576
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseCreateHandleReadSize
                                                                                    • String ID:
                                                                                    • API String ID: 3919263394-0
                                                                                    • Opcode ID: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                                    • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                                                                    • Opcode Fuzzy Hash: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                                    • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                                                                    APIs
                                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                                                                    • GetLastError.KERNEL32 ref: 0040D0BE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateErrorLastMutex
                                                                                    • String ID: Rmc-9XV80Z
                                                                                    • API String ID: 1925916568-3099140052
                                                                                    • Opcode ID: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                                    • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                                                                    • Opcode Fuzzy Hash: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                                    • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                                                                                    APIs
                                                                                    • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                    • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: EventObjectSingleWaitsend
                                                                                    • String ID:
                                                                                    • API String ID: 3963590051-0
                                                                                    • Opcode ID: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                                                                                    • Instruction ID: ade4869c8039bafc3f5202e75afdfb18787be874a76dce876c460fae4797ad88
                                                                                    • Opcode Fuzzy Hash: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                                                                                    • Instruction Fuzzy Hash: 152124B2900119BBCB04ABA1DC95DEEB77CFF14314B00452FF515B71E2EB38AA15C6A4
                                                                                    APIs
                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                                                    • RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3677997916-0
                                                                                    • Opcode ID: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                                    • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                                                                    • Opcode Fuzzy Hash: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                                    • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                                                                                    APIs
                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                                                                    • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                                                                    • RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3677997916-0
                                                                                    • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                                    • Instruction ID: cdc8bb2f12cdea1da97e3e4d454c68039a4c25ad8704162e95ac064a0ac82555
                                                                                    • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                                    • Instruction Fuzzy Hash: C301AD7540022DFBDF215F91DC04DEB3F38EF05761F008065BE09620A1E7358AA5EB94
                                                                                    APIs
                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                                                                                    • RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3677997916-0
                                                                                    • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                    • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                                                                    • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                    • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                                                                    APIs
                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C1D7,00466C58), ref: 00413551
                                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C1D7,00466C58), ref: 00413565
                                                                                    • RegCloseKey.KERNEL32(?,?,?,0040C1D7,00466C58), ref: 00413570
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3677997916-0
                                                                                    • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                    • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                                                                                    • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                    • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                                                                                    APIs
                                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                    • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                                                    • RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateValue
                                                                                    • String ID:
                                                                                    • API String ID: 1818849710-0
                                                                                    • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                    • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                                                                                    • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                    • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                                    • SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                                    • recv.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404BDA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: EventObjectSingleWaitrecv
                                                                                    • String ID:
                                                                                    • API String ID: 311754179-0
                                                                                    • Opcode ID: cdb06e8163b8322063f134be74ce7e1cf20e247c26aa7992d3e9e0113c183a83
                                                                                    • Instruction ID: 0899ded2458b7d4720508400fe02e5f5257555b40415190a6d7bc1514cf1b529
                                                                                    • Opcode Fuzzy Hash: cdb06e8163b8322063f134be74ce7e1cf20e247c26aa7992d3e9e0113c183a83
                                                                                    • Instruction Fuzzy Hash: 53F05E36108212FFC7019F10EC09E0AFB62FB85721F10862AF510512B08771FC20DB95
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _wcslen
                                                                                    • String ID: pQG
                                                                                    • API String ID: 176396367-3769108836
                                                                                    • Opcode ID: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                                                                                    • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                                                                                    • Opcode Fuzzy Hash: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                                                                                    • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                                                                                    APIs
                                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B85B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: GlobalMemoryStatus
                                                                                    • String ID: @
                                                                                    • API String ID: 1890195054-2766056989
                                                                                    • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                                    • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                                                    • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                                    • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                                                    APIs
                                                                                    • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                                      • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateEventStartupsocket
                                                                                    • String ID:
                                                                                    • API String ID: 1953588214-0
                                                                                    • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                                    • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                                                                                    • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                                    • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                                                                    • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                                                                    • Opcode Fuzzy Hash: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                                                                    • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32 ref: 0041BB49
                                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BB5C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Window$ForegroundText
                                                                                    • String ID:
                                                                                    • API String ID: 29597999-0
                                                                                    • Opcode ID: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                                                    • Instruction ID: 8c7c0eb369f00208a7459315ff6bb8442305c4ed6b2016914032ba092e23deac
                                                                                    • Opcode Fuzzy Hash: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                                                    • Instruction Fuzzy Hash: 21E04875A00328A7E720A7A5AC4EFD5776C9708755F0001AEBA1CD61C2EDB4AD448BE5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                                                                                    • Instruction ID: 3af98ca860494c99acd04ebe2bb4cc6dc665ec8dea8eb108ba88c8789d347e54
                                                                                    • Opcode Fuzzy Hash: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                                                                                    • Instruction Fuzzy Hash: 9411E3B27201019FD7149B18C860BA6B766FF50710F5942AAE256CB3B2DB35EC91CA98
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                                    • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                                                                    • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                                    • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                                                                    APIs
                                                                                    • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Startup
                                                                                    • String ID:
                                                                                    • API String ID: 724789610-0
                                                                                    • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                                    • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                                                                                    • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                                    • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                                                                                    APIs
                                                                                    • std::_Deallocate.LIBCONCRT ref: 00402E2B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Deallocatestd::_
                                                                                    • String ID:
                                                                                    • API String ID: 1323251999-0
                                                                                    • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                                    • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                                                                                    • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                                    • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                                    • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                                                                                    • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                                    • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                                                                                    APIs
                                                                                    • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                                                                    • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                                                                      • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                                                      • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                                                      • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                                                      • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                                                      • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                                                                    • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                                                                                    • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                                                                    • DeleteFileA.KERNEL32(?), ref: 0040868D
                                                                                      • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                                                                      • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                                      • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                                      • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                                    • Sleep.KERNEL32(000007D0), ref: 00408733
                                                                                    • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                                                                      • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                                    • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                                    • API String ID: 1067849700-181434739
                                                                                    • Opcode ID: 57778538d65cc0573b7dc7249e4f40315ef5ff13e5eeb09f93453fd326c992d2
                                                                                    • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                                                                    • Opcode Fuzzy Hash: 57778538d65cc0573b7dc7249e4f40315ef5ff13e5eeb09f93453fd326c992d2
                                                                                    • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    • __Init_thread_footer.LIBCMT ref: 00405723
                                                                                    • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                                                                    • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                                    • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                                                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                                      • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                                                                                    • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                                                                    • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                                    • CloseHandle.KERNEL32 ref: 00405A23
                                                                                    • CloseHandle.KERNEL32 ref: 00405A2B
                                                                                    • CloseHandle.KERNEL32 ref: 00405A3D
                                                                                    • CloseHandle.KERNEL32 ref: 00405A45
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                    • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                                    • API String ID: 2994406822-18413064
                                                                                    • Opcode ID: c30a8cf89a44f1cf57d18c0b64f38ea7b5420e979d9c278b3fb3eac4bd9d804e
                                                                                    • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                                                                    • Opcode Fuzzy Hash: c30a8cf89a44f1cf57d18c0b64f38ea7b5420e979d9c278b3fb3eac4bd9d804e
                                                                                    • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                                                                    APIs
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00412141
                                                                                      • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                      • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                                                      • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                                                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00412190
                                                                                    • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                                                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                                    • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                                    • API String ID: 3018269243-13974260
                                                                                    • Opcode ID: a1d17eaa79687276733ec66dbf34ac3729f4deb925ccc61b392e9011f6d934ea
                                                                                    • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                                                                    • Opcode Fuzzy Hash: a1d17eaa79687276733ec66dbf34ac3729f4deb925ccc61b392e9011f6d934ea
                                                                                    • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                                                                    APIs
                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040BC04
                                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFile$FirstNext
                                                                                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                    • API String ID: 1164774033-3681987949
                                                                                    • Opcode ID: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                                                                                    • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                                                                    • Opcode Fuzzy Hash: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                                                                                    • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                                                                    APIs
                                                                                    • OpenClipboard.USER32 ref: 004168FD
                                                                                    • EmptyClipboard.USER32 ref: 0041690B
                                                                                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00416934
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                                                                    • CloseClipboard.USER32 ref: 00416990
                                                                                    • OpenClipboard.USER32 ref: 00416997
                                                                                    • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                                    • CloseClipboard.USER32 ref: 004169BF
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                    • String ID: !D@
                                                                                    • API String ID: 3520204547-604454484
                                                                                    • Opcode ID: dc76dea36350f4b7d3c0894d65fe2a70513ee4335e9dbb343148a7a88716f0f4
                                                                                    • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                                                                    • Opcode Fuzzy Hash: dc76dea36350f4b7d3c0894d65fe2a70513ee4335e9dbb343148a7a88716f0f4
                                                                                    • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                                                                    APIs
                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040BE04
                                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$Close$File$FirstNext
                                                                                    • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                    • API String ID: 3527384056-432212279
                                                                                    • Opcode ID: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                                                                                    • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                                                                    • Opcode Fuzzy Hash: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                                                                                    • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                                                                    APIs
                                                                                    • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                                                                    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                                                                    • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                                                                    • CloseHandle.KERNEL32(?), ref: 004134A0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                                    • String ID:
                                                                                    • API String ID: 297527592-0
                                                                                    • Opcode ID: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                                                                                    • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                                                                    • Opcode Fuzzy Hash: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                                                                                    • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                                                                    APIs
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                                                                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                                                                      • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                      • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                    • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                                    • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                                    • API String ID: 3756808967-1743721670
                                                                                    • Opcode ID: 5b42a80951eb342c4a971769a7958462a684e848444859b94199bc40bd9fc38b
                                                                                    • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                                                                    • Opcode Fuzzy Hash: 5b42a80951eb342c4a971769a7958462a684e848444859b94199bc40bd9fc38b
                                                                                    • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0$1$2$3$4$5$6$7$VG
                                                                                    • API String ID: 0-1861860590
                                                                                    • Opcode ID: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                                                                                    • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                                                                    • Opcode Fuzzy Hash: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                                                                                    • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 0040755C
                                                                                    • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Object_wcslen
                                                                                    • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                    • API String ID: 240030777-3166923314
                                                                                    • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                                    • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                                                                    • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                                    • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                                                                    APIs
                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                                                                    • GetLastError.KERNEL32 ref: 0041A84C
                                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                    • String ID:
                                                                                    • API String ID: 3587775597-0
                                                                                    • Opcode ID: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                                                                                    • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                                                                    • Opcode Fuzzy Hash: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                                                                                    • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                                                                    • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFile$FirstNext
                                                                                    • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                    • API String ID: 1164774033-405221262
                                                                                    • Opcode ID: 84dda7f2d703a02c39fd3e5febc082f989296661594c5de04835ca6e39ff1059
                                                                                    • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                                                                    • Opcode Fuzzy Hash: 84dda7f2d703a02c39fd3e5febc082f989296661594c5de04835ca6e39ff1059
                                                                                    • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C41F
                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C42C
                                                                                      • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C44D
                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                                                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C473
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                    • String ID:
                                                                                    • API String ID: 2341273852-0
                                                                                    • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                                    • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                                                                    • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                                    • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                                                                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                                                                      • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$Find$CreateFirstNext
                                                                                    • String ID: 8SG$PXG$PXG$NG$PG
                                                                                    • API String ID: 341183262-3812160132
                                                                                    • Opcode ID: 71882f448a37ea3b9a1220598091edfd729fc592b12614690367cd5d0910c7d3
                                                                                    • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                                                                    • Opcode Fuzzy Hash: 71882f448a37ea3b9a1220598091edfd729fc592b12614690367cd5d0910c7d3
                                                                                    • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                                                                    • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                                                                    • GetLastError.KERNEL32 ref: 0040A328
                                                                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                                                                                    • TranslateMessage.USER32(?), ref: 0040A385
                                                                                    • DispatchMessageA.USER32(?), ref: 0040A390
                                                                                    Strings
                                                                                    • Keylogger initialization failure: error , xrefs: 0040A33C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                    • String ID: Keylogger initialization failure: error
                                                                                    • API String ID: 3219506041-952744263
                                                                                    • Opcode ID: 142d2ef2dd7a7f37dd8d92b010d75905bf9ead93cb94639157b9e4adcc72f5f3
                                                                                    • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                                                                    • Opcode Fuzzy Hash: 142d2ef2dd7a7f37dd8d92b010d75905bf9ead93cb94639157b9e4adcc72f5f3
                                                                                    • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32 ref: 0040A451
                                                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                                                    • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                                                    • GetKeyState.USER32(00000010), ref: 0040A46E
                                                                                    • GetKeyboardState.USER32(?), ref: 0040A479
                                                                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                                                    • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A535
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                    • String ID:
                                                                                    • API String ID: 1888522110-0
                                                                                    • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                                    • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                                                                    • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                                    • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                                                                    APIs
                                                                                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                    • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                    • API String ID: 2127411465-314212984
                                                                                    • Opcode ID: 17c623bb6346a43d49901c690195cc0947e6daf374429e03ea7220db216e32de
                                                                                    • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                                                                    • Opcode Fuzzy Hash: 17c623bb6346a43d49901c690195cc0947e6daf374429e03ea7220db216e32de
                                                                                    • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                                                                    APIs
                                                                                      • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                                      • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                                      • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                                      • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                                      • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                                                                    • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                                                                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                    • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                                    • API String ID: 1589313981-2876530381
                                                                                    • Opcode ID: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                                                                                    • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                                                                    • Opcode Fuzzy Hash: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                                                                                    • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                                                                    APIs
                                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                                                                    • GetLastError.KERNEL32 ref: 0040BA93
                                                                                    Strings
                                                                                    • UserProfile, xrefs: 0040BA59
                                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                                                                    • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                                                                    • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DeleteErrorFileLast
                                                                                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                    • API String ID: 2018770650-1062637481
                                                                                    • Opcode ID: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                                                                                    • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                                                                    • Opcode Fuzzy Hash: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                                                                                    • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                                    • GetLastError.KERNEL32 ref: 004179D8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                    • String ID: SeShutdownPrivilege
                                                                                    • API String ID: 3534403312-3733053543
                                                                                    • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                                    • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                                                                    • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                                    • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 00409293
                                                                                      • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00B4CC78,00000010), ref: 004048E0
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                                                                    • FindClose.KERNEL32(00000000), ref: 004093FC
                                                                                      • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                      • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                      • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                                                    • FindClose.KERNEL32(00000000), ref: 004095F4
                                                                                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                                    • String ID:
                                                                                    • API String ID: 1824512719-0
                                                                                    • Opcode ID: 1ca458b9dfc5378f3b4b8b2d2710dcda1e97675f792ab16e9197e187d17a465a
                                                                                    • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                                                                    • Opcode Fuzzy Hash: 1ca458b9dfc5378f3b4b8b2d2710dcda1e97675f792ab16e9197e187d17a465a
                                                                                    • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                                                                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                    • String ID:
                                                                                    • API String ID: 276877138-0
                                                                                    • Opcode ID: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                                    • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                                                                    • Opcode Fuzzy Hash: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                                    • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 00452555
                                                                                    • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 0045257E
                                                                                    • GetACP.KERNEL32 ref: 00452593
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID: ACP$OCP
                                                                                    • API String ID: 2299586839-711371036
                                                                                    • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                                    • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                                                                    • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                                    • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                                                                    APIs
                                                                                    • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                                                                                    • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                                                                    • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                                                                    • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                    • String ID: SETTINGS
                                                                                    • API String ID: 3473537107-594951305
                                                                                    • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                                    • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                                                                    • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                                    • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 004096A5
                                                                                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                                                                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$File$CloseFirstH_prologNext
                                                                                    • String ID:
                                                                                    • API String ID: 1157919129-0
                                                                                    • Opcode ID: 058593f78ef05559250ca5d28c3ddffc402720ed64ab7c8d350ffa7421f350a9
                                                                                    • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                                                                    • Opcode Fuzzy Hash: 058593f78ef05559250ca5d28c3ddffc402720ed64ab7c8d350ffa7421f350a9
                                                                                    • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                                                                    APIs
                                                                                      • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                    • GetUserDefaultLCID.KERNEL32 ref: 0045279C
                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0045286D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                    • String ID:
                                                                                    • API String ID: 745075371-0
                                                                                    • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                                    • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                                                                    • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                                    • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 0040884C
                                                                                    • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                                    • String ID:
                                                                                    • API String ID: 1771804793-0
                                                                                    • Opcode ID: 99a3056b48020488f4a7cc8d14455ae8aa2eebd7be9758c69deaf4fbc99c6cac
                                                                                    • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                                                                    • Opcode Fuzzy Hash: 99a3056b48020488f4a7cc8d14455ae8aa2eebd7be9758c69deaf4fbc99c6cac
                                                                                    • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                                                                    APIs
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                                                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DownloadExecuteFileShell
                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$open
                                                                                    • API String ID: 2825088817-2582742282
                                                                                    • Opcode ID: 973a1958b5d6a3eb55066bc130d3e016a8b292e4abd07c6b68581603c8dcff59
                                                                                    • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                                                                    • Opcode Fuzzy Hash: 973a1958b5d6a3eb55066bc130d3e016a8b292e4abd07c6b68581603c8dcff59
                                                                                    • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileFind$FirstNextsend
                                                                                    • String ID: XPG$XPG
                                                                                    • API String ID: 4113138495-1962359302
                                                                                    • Opcode ID: 3a8d020ae5d66940f0fdd0f30d9b9c9ea6206788ca54081309bf9aa6036a7366
                                                                                    • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                                                                    • Opcode Fuzzy Hash: 3a8d020ae5d66940f0fdd0f30d9b9c9ea6206788ca54081309bf9aa6036a7366
                                                                                    • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                                                                    APIs
                                                                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                      • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                      • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137E1
                                                                                      • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137EC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateInfoParametersSystemValue
                                                                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                    • API String ID: 4127273184-3576401099
                                                                                    • Opcode ID: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                                                                                    • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                                                                    • Opcode Fuzzy Hash: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                                                                                    • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                                                                    APIs
                                                                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                      • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                      • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137E1
                                                                                      • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137EC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateInfoParametersSystemValue
                                                                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                    • API String ID: 4127273184-3576401099
                                                                                    • Opcode ID: 378c07e8b963d07e1fd27d23ce2453f53b5745a4dbb83394c57e4242650b378c
                                                                                    • Instruction ID: 1d4fccf664b116fd7e9026c1daa93839c24cbfeedf45b0e65449f5778d70c30d
                                                                                    • Opcode Fuzzy Hash: 378c07e8b963d07e1fd27d23ce2453f53b5745a4dbb83394c57e4242650b378c
                                                                                    • Instruction Fuzzy Hash: DBF0C272BC421022D82931B96DAFBFE18058742F61F15412BF302652CAD4CE6A81428F
                                                                                    APIs
                                                                                      • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 00451E3A
                                                                                    • _wcschr.LIBVCRUNTIME ref: 00451ECA
                                                                                    • _wcschr.LIBVCRUNTIME ref: 00451ED8
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00451F7B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                    • String ID:
                                                                                    • API String ID: 4212172061-0
                                                                                    • Opcode ID: 715b93ef3f017ee4fea0110e94a068843382a27aff4af5d2daf4b4fdd25eb79d
                                                                                    • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                                                                    • Opcode Fuzzy Hash: 715b93ef3f017ee4fea0110e94a068843382a27aff4af5d2daf4b4fdd25eb79d
                                                                                    • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 0044943D
                                                                                      • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                    • GetTimeZoneInformation.KERNEL32 ref: 0044944F
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,?,00472764,000000FF,?,0000003F,?,?), ref: 004494C7
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,?,004727B8,000000FF,?,0000003F,?,?,?,00472764,000000FF,?,0000003F,?,?), ref: 004494F4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                    • String ID:
                                                                                    • API String ID: 806657224-0
                                                                                    • Opcode ID: aeb37be2ef55a5d103ab6b4be93faccb032caed00e04dd613037f001c8cf3bb4
                                                                                    • Instruction ID: d52e19fe16dfdee109f40d049db845c42e01460133d57766726f1505d2785bee
                                                                                    • Opcode Fuzzy Hash: aeb37be2ef55a5d103ab6b4be93faccb032caed00e04dd613037f001c8cf3bb4
                                                                                    • Instruction Fuzzy Hash: 2D31F371904205EFDB15DF69CE8186EBBB8FF0572072446AFE024A73A1D3748D41EB28
                                                                                    APIs
                                                                                      • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                    • String ID:
                                                                                    • API String ID: 2829624132-0
                                                                                    • Opcode ID: 711793eb573856c12bfad09b44d2354213151b00c391b4c97ce46ce3e25352d9
                                                                                    • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                                                                    • Opcode Fuzzy Hash: 711793eb573856c12bfad09b44d2354213151b00c391b4c97ce46ce3e25352d9
                                                                                    • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                    • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                    • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                    • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                                    • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                                                                    • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                                    • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                                                                    APIs
                                                                                    • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,00000000), ref: 004338DA
                                                                                    • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                                                                                    • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Crypt$Context$AcquireRandomRelease
                                                                                    • String ID:
                                                                                    • API String ID: 1815803762-0
                                                                                    • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                    • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                                                                    • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                    • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                    • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                    • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 1703294689-0
                                                                                    • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                    • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                    • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                    • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                                                                                    • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                                                                                    • ExitProcess.KERNEL32 ref: 0044338F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 1703294689-0
                                                                                    • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                                    • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                                                                    • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                                    • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                                                                                    APIs
                                                                                    • OpenClipboard.USER32(00000000), ref: 0040B74C
                                                                                    • GetClipboardData.USER32(0000000D), ref: 0040B758
                                                                                    • CloseClipboard.USER32 ref: 0040B760
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Clipboard$CloseDataOpen
                                                                                    • String ID:
                                                                                    • API String ID: 2058664381-0
                                                                                    • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                                    • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                                                                    • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                                    • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                                                                    APIs
                                                                                    • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                                                                                    • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,0041605F,00000000), ref: 0041BBE7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CloseHandleOpenResume
                                                                                    • String ID:
                                                                                    • API String ID: 3614150671-0
                                                                                    • Opcode ID: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                                                    • Instruction ID: 00af7d86c2812e48088786baf9e1e683bef33431c8858657b58e82835f0f92e7
                                                                                    • Opcode Fuzzy Hash: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                                                    • Instruction Fuzzy Hash: 7AD05E36204121E3C220176A7C0CD97AD68DBC5AA2705412AF804C22609A60CC0186E4
                                                                                    APIs
                                                                                    • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                                                                                    • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,0041603A,00000000), ref: 0041BBBB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CloseHandleOpenSuspend
                                                                                    • String ID:
                                                                                    • API String ID: 1999457699-0
                                                                                    • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                                                    • Instruction ID: 611eda4fe747f1c58df557fb912083c2b4b70512fbfbfb6239720577e9304ccf
                                                                                    • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                                                    • Instruction Fuzzy Hash: 98D05E36204121E3C7211B6A7C0CD97AD68DFC5AA2705412AF804D26549A20CC0186E4
                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FeaturePresentProcessor
                                                                                    • String ID: MZ@
                                                                                    • API String ID: 2325560087-2978689999
                                                                                    • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                                    • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                                                                    • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                                    • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID: GetLocaleInfoEx
                                                                                    • API String ID: 2299586839-2904428671
                                                                                    • Opcode ID: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                                                                    • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                                                                    • Opcode Fuzzy Hash: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                                                                    • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                                                                    APIs
                                                                                      • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                    • String ID:
                                                                                    • API String ID: 1663032902-0
                                                                                    • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                                    • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                                                                    • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                                    • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                                                                    APIs
                                                                                      • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                    • EnumSystemLocalesW.KERNEL32(00452143,00000001), ref: 0045208D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                    • String ID:
                                                                                    • API String ID: 1084509184-0
                                                                                    • Opcode ID: cd62537e8c3e003b13522b9155b4eea68fe7d0001d8d421cd242523031e004a2
                                                                                    • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                                                                    • Opcode Fuzzy Hash: cd62537e8c3e003b13522b9155b4eea68fe7d0001d8d421cd242523031e004a2
                                                                                    • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                                                                    APIs
                                                                                      • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$InfoLocale_abort_free
                                                                                    • String ID:
                                                                                    • API String ID: 2692324296-0
                                                                                    • Opcode ID: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                                                                                    • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                                                                    • Opcode Fuzzy Hash: ed905f4e10f5b376defebc36d7d97aa2bb2c1abe5f1ea1ee61b46868c197e3f5
                                                                                    • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                                                                    APIs
                                                                                      • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                    • EnumSystemLocalesW.KERNEL32(00452393,00000001), ref: 00452102
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                    • String ID:
                                                                                    • API String ID: 1084509184-0
                                                                                    • Opcode ID: b47e8d7704c3cea33439bb1b9c4b2a0344765dc89a2caae7295f0002ba586764
                                                                                    • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                                                                    • Opcode Fuzzy Hash: b47e8d7704c3cea33439bb1b9c4b2a0344765dc89a2caae7295f0002ba586764
                                                                                    • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                                                                    APIs
                                                                                      • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                                                    • EnumSystemLocalesW.KERNEL32(Function_0004843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                    • String ID:
                                                                                    • API String ID: 1272433827-0
                                                                                    • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                                    • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                                                                    • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                                    • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                                                                    APIs
                                                                                      • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                    • EnumSystemLocalesW.KERNEL32(00451F27,00000001), ref: 00452007
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                    • String ID:
                                                                                    • API String ID: 1084509184-0
                                                                                    • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                                    • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                                                                    • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                                    • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                                                                    APIs
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                    • String ID:
                                                                                    • API String ID: 3192549508-0
                                                                                    • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                                    • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                                                                    • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                                    • Instruction Fuzzy Hash:
                                                                                    APIs
                                                                                    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                                                                      • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                                                                    • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                                                                    • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                                    • DeleteDC.GDI32(00000000), ref: 00418F68
                                                                                    • DeleteObject.GDI32(00000000), ref: 00418F6B
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                                                                    • DeleteDC.GDI32(00000000), ref: 00418F9D
                                                                                    • DeleteDC.GDI32(00000000), ref: 00418FA0
                                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                                                                    • GetCursorInfo.USER32(?), ref: 00418FE2
                                                                                    • GetIconInfo.USER32(?,?), ref: 00418FF8
                                                                                    • DeleteObject.GDI32(?), ref: 00419027
                                                                                    • DeleteObject.GDI32(?), ref: 00419034
                                                                                    • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                                                                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                                                                    • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                                                                    • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                                                                    • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                                                                    • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                                                                    • DeleteDC.GDI32(?), ref: 004191B7
                                                                                    • DeleteDC.GDI32(00000000), ref: 004191BA
                                                                                    • DeleteObject.GDI32(00000000), ref: 004191BD
                                                                                    • GlobalFree.KERNEL32(?), ref: 004191C8
                                                                                    • DeleteObject.GDI32(00000000), ref: 0041927C
                                                                                    • GlobalFree.KERNEL32(?), ref: 00419283
                                                                                    • DeleteDC.GDI32(?), ref: 00419293
                                                                                    • DeleteDC.GDI32(00000000), ref: 0041929E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                                                    • String ID: DISPLAY
                                                                                    • API String ID: 4256916514-865373369
                                                                                    • Opcode ID: b81785b538983269000155a5db9ce9f88dc46a30689f781578aa582ea0c925e1
                                                                                    • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                                                                    • Opcode Fuzzy Hash: b81785b538983269000155a5db9ce9f88dc46a30689f781578aa582ea0c925e1
                                                                                    • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                                                                    APIs
                                                                                      • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                      • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                                                                      • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                      • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                                                      • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                      • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                                                                    • ExitProcess.KERNEL32 ref: 0040D80B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                    • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                    • API String ID: 1861856835-1447701601
                                                                                    • Opcode ID: d8e98d1fd2f1bdc760dae9a559abea4cd274c949fa03be3778951f2c3f1c4be1
                                                                                    • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                                                                    • Opcode Fuzzy Hash: d8e98d1fd2f1bdc760dae9a559abea4cd274c949fa03be3778951f2c3f1c4be1
                                                                                    • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                                                                    APIs
                                                                                      • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                      • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                                                                      • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                      • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                                                      • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                      • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                                                                    • ExitProcess.KERNEL32 ref: 0040D454
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                    • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                                                                                    • API String ID: 3797177996-2483056239
                                                                                    • Opcode ID: 9f8aff639c038808ac3b2befcd98474336a74f9fecab3a97dc503a806b773c90
                                                                                    • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                                                                    • Opcode Fuzzy Hash: 9f8aff639c038808ac3b2befcd98474336a74f9fecab3a97dc503a806b773c90
                                                                                    • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                                                                    APIs
                                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                                                                    • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                                                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00412576
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                                                                    • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                                                                    • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                                                                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                                                                    • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                                                                      • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                                                                    • Sleep.KERNEL32(000001F4), ref: 004126BD
                                                                                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                                    • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                                    • API String ID: 2649220323-436679193
                                                                                    • Opcode ID: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                                                                                    • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                                                                    • Opcode Fuzzy Hash: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                                                                                    • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                                                                    APIs
                                                                                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                                                                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                                                                                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                                                                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                                                                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                                                                    • SetEvent.KERNEL32 ref: 0041B2AA
                                                                                    • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                                                                    • CloseHandle.KERNEL32 ref: 0041B2CB
                                                                                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                                                                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                                    • API String ID: 738084811-2094122233
                                                                                    • Opcode ID: e18d78bbb589c3689a22f9da0250713fe620a00d5e636c3da1970b50c4f12154
                                                                                    • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                                                                    • Opcode Fuzzy Hash: e18d78bbb589c3689a22f9da0250713fe620a00d5e636c3da1970b50c4f12154
                                                                                    • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                                    • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                                    • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                                    • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$Write$Create
                                                                                    • String ID: RIFF$WAVE$data$fmt
                                                                                    • API String ID: 1602526932-4212202414
                                                                                    • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                                    • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                                                                    • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                                    • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000001,00407688,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                    • API String ID: 1646373207-89630625
                                                                                    • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                                    • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                                                                    • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                                    • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                                                                    APIs
                                                                                      • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                      • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                      • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                    • _strlen.LIBCMT ref: 10001855
                                                                                    • _strlen.LIBCMT ref: 10001869
                                                                                    • _strlen.LIBCMT ref: 1000188B
                                                                                    • _strlen.LIBCMT ref: 100018AE
                                                                                    • _strlen.LIBCMT ref: 100018C8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen$File$CopyCreateDelete
                                                                                    • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                    • API String ID: 3296212668-3023110444
                                                                                    • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                    • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                    • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                    • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 0040CE42
                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                                                                    • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                                                                                    • _wcslen.LIBCMT ref: 0040CF21
                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                                                                    • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000000,00000000), ref: 0040CFBF
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                                                                    • _wcslen.LIBCMT ref: 0040D001
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                                                                    • ExitProcess.KERNEL32 ref: 0040D09D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                    • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$del$open
                                                                                    • API String ID: 1579085052-2041965819
                                                                                    • Opcode ID: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                                                                                    • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                                                                    • Opcode Fuzzy Hash: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                                                                                    • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                                                                    • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                                                                    • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                                                                    • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                                                                    • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                                                                    • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                                                                    • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                                                                    • _wcslen.LIBCMT ref: 0041C1CC
                                                                                    • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                                                                    • GetLastError.KERNEL32 ref: 0041C204
                                                                                    • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                                                                    • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                                                                    • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                                                                    • GetLastError.KERNEL32 ref: 0041C261
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                    • String ID: ?
                                                                                    • API String ID: 3941738427-1684325040
                                                                                    • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                                    • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                                                                    • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                                    • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen
                                                                                    • String ID: %m$~$Gon~$~F@7$~dra
                                                                                    • API String ID: 4218353326-230879103
                                                                                    • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                    • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                    • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                    • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$EnvironmentVariable$_wcschr
                                                                                    • String ID:
                                                                                    • API String ID: 3899193279-0
                                                                                    • Opcode ID: 28687395a6aa2078608bd89f57b343956b66557142a9620950dd617db5e8e69e
                                                                                    • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                                                                    • Opcode Fuzzy Hash: 28687395a6aa2078608bd89f57b343956b66557142a9620950dd617db5e8e69e
                                                                                    • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                                                                    APIs
                                                                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                                                    • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                                                    • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                    • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                    • API String ID: 2490988753-744132762
                                                                                    • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                                    • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                                                                    • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                                    • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                                                                                    APIs
                                                                                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                                                                    • GetCursorPos.USER32(?), ref: 0041D67A
                                                                                    • SetForegroundWindow.USER32(?), ref: 0041D683
                                                                                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                                                                    • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                                                                    • ExitProcess.KERNEL32 ref: 0041D6F6
                                                                                    • CreatePopupMenu.USER32 ref: 0041D6FC
                                                                                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                    • String ID: Close
                                                                                    • API String ID: 1657328048-3535843008
                                                                                    • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                                    • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                                                                    • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                                    • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$Info
                                                                                    • String ID:
                                                                                    • API String ID: 2509303402-0
                                                                                    • Opcode ID: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                                                                                    • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                                                                    • Opcode Fuzzy Hash: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                                                                                    • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                                                                                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                                                                    • __aulldiv.LIBCMT ref: 00408D88
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                                                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                                                                    • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00409037
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                                    • API String ID: 3086580692-2582957567
                                                                                    • Opcode ID: 568e37e0886c391f5bf18194f0f3e5bd464605bef8cf353a59b31ab682a984e7
                                                                                    • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                                                                    • Opcode Fuzzy Hash: 568e37e0886c391f5bf18194f0f3e5bd464605bef8cf353a59b31ab682a984e7
                                                                                    • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(00001388), ref: 0040A77B
                                                                                      • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                                                      • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                                      • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                                      • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                                                                      • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                    • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                                                    • API String ID: 3795512280-1152054767
                                                                                    • Opcode ID: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                                                                                    • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                                                                    • Opcode Fuzzy Hash: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                                                                                    • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E
                                                                                    APIs
                                                                                    • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                    • _free.LIBCMT ref: 10007CFB
                                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                    • _free.LIBCMT ref: 10007D1D
                                                                                    • _free.LIBCMT ref: 10007D32
                                                                                    • _free.LIBCMT ref: 10007D3D
                                                                                    • _free.LIBCMT ref: 10007D5F
                                                                                    • _free.LIBCMT ref: 10007D72
                                                                                    • _free.LIBCMT ref: 10007D80
                                                                                    • _free.LIBCMT ref: 10007D8B
                                                                                    • _free.LIBCMT ref: 10007DC3
                                                                                    • _free.LIBCMT ref: 10007DCA
                                                                                    • _free.LIBCMT ref: 10007DE7
                                                                                    • _free.LIBCMT ref: 10007DFF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                    • String ID:
                                                                                    • API String ID: 161543041-0
                                                                                    • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                    • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                    • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                    • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                    APIs
                                                                                    • ___free_lconv_mon.LIBCMT ref: 0045138A
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                                                                      • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                                                                    • _free.LIBCMT ref: 0045137F
                                                                                      • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                    • _free.LIBCMT ref: 004513A1
                                                                                    • _free.LIBCMT ref: 004513B6
                                                                                    • _free.LIBCMT ref: 004513C1
                                                                                    • _free.LIBCMT ref: 004513E3
                                                                                    • _free.LIBCMT ref: 004513F6
                                                                                    • _free.LIBCMT ref: 00451404
                                                                                    • _free.LIBCMT ref: 0045140F
                                                                                    • _free.LIBCMT ref: 00451447
                                                                                    • _free.LIBCMT ref: 0045144E
                                                                                    • _free.LIBCMT ref: 0045146B
                                                                                    • _free.LIBCMT ref: 00451483
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                    • String ID:
                                                                                    • API String ID: 161543041-0
                                                                                    • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                    • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                                                                    • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                    • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                                                                    APIs
                                                                                    • __EH_prolog.LIBCMT ref: 0041A04A
                                                                                    • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                                                                    • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                                                                    • GetLocalTime.KERNEL32(?), ref: 0041A196
                                                                                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                    • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                                    • API String ID: 489098229-1431523004
                                                                                    • Opcode ID: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                                                                                    • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                                                                    • Opcode Fuzzy Hash: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                                                                                    • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                                                                    APIs
                                                                                      • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                      • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                      • Part of subcall function 00413733: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                                                                      • Part of subcall function 00413733: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                                                                      • Part of subcall function 00413733: RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                                                                    • ExitProcess.KERNEL32 ref: 0040D9FF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                    • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                    • API String ID: 1913171305-3159800282
                                                                                    • Opcode ID: 8db7f9089fcdac6088c6dca5af5b566ceab7d3a4e33a82e448366c6afc64066d
                                                                                    • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                                                                    • Opcode Fuzzy Hash: 8db7f9089fcdac6088c6dca5af5b566ceab7d3a4e33a82e448366c6afc64066d
                                                                                    • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                                    • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                                                                    • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                                    • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                                                                    APIs
                                                                                      • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                                                                                    • GetLastError.KERNEL32 ref: 00455D6F
                                                                                    • __dosmaperr.LIBCMT ref: 00455D76
                                                                                    • GetFileType.KERNEL32(00000000), ref: 00455D82
                                                                                    • GetLastError.KERNEL32 ref: 00455D8C
                                                                                    • __dosmaperr.LIBCMT ref: 00455D95
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                                                                    • CloseHandle.KERNEL32(?), ref: 00455EFF
                                                                                    • GetLastError.KERNEL32 ref: 00455F31
                                                                                    • __dosmaperr.LIBCMT ref: 00455F38
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                    • String ID: H
                                                                                    • API String ID: 4237864984-2852464175
                                                                                    • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                                    • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                                                                    • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                                    • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID: \&G$\&G$`&G
                                                                                    • API String ID: 269201875-253610517
                                                                                    • Opcode ID: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                                                                                    • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                                                                    • Opcode Fuzzy Hash: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                                                                                    • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 65535$udp
                                                                                    • API String ID: 0-1267037602
                                                                                    • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                                    • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                                                                    • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                                    • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 0040AD73
                                                                                    • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                                                                    • GetForegroundWindow.USER32 ref: 0040AD84
                                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                                                                    • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                                                                                    • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                                                                      • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                    • String ID: [${ User has been idle for $ minutes }$]
                                                                                    • API String ID: 911427763-3954389425
                                                                                    • Opcode ID: 48f1adaacdea2f975f01b8500f115fca2f5cc24c7704d57e661a1b5e6bda6b32
                                                                                    • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                                                                    • Opcode Fuzzy Hash: 48f1adaacdea2f975f01b8500f115fca2f5cc24c7704d57e661a1b5e6bda6b32
                                                                                    • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                                                                    • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                                                                    • __dosmaperr.LIBCMT ref: 0043A926
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                                                                    • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                                                                    • __dosmaperr.LIBCMT ref: 0043A963
                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                                                                    • __dosmaperr.LIBCMT ref: 0043A9B7
                                                                                    • _free.LIBCMT ref: 0043A9C3
                                                                                    • _free.LIBCMT ref: 0043A9CA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                    • String ID:
                                                                                    • API String ID: 2441525078-0
                                                                                    • Opcode ID: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                                                                                    • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                                                                    • Opcode Fuzzy Hash: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                                                                                    • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                                                                    APIs
                                                                                    • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                                                    • TranslateMessage.USER32(?), ref: 0040557E
                                                                                    • DispatchMessageA.USER32(?), ref: 00405589
                                                                                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                    • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                    • API String ID: 2956720200-749203953
                                                                                    • Opcode ID: 9e04cbb31bc8daf92a2141eab1a54e97806f76b2276d0c588a0d83a3ae4fd87a
                                                                                    • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                                                                    • Opcode Fuzzy Hash: 9e04cbb31bc8daf92a2141eab1a54e97806f76b2276d0c588a0d83a3ae4fd87a
                                                                                    • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                                                                    APIs
                                                                                      • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                                                                    • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                                                                    • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                                    • String ID: 0VG$0VG$<$@$Temp
                                                                                    • API String ID: 1704390241-2575729100
                                                                                    • Opcode ID: a622ca32611d5a72253d61c9bab598c2ca2844357dabfe39f52712de72d2cd75
                                                                                    • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                                                                    • Opcode Fuzzy Hash: a622ca32611d5a72253d61c9bab598c2ca2844357dabfe39f52712de72d2cd75
                                                                                    • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                                                                    APIs
                                                                                    • OpenClipboard.USER32 ref: 0041697C
                                                                                    • EmptyClipboard.USER32 ref: 0041698A
                                                                                    • CloseClipboard.USER32 ref: 00416990
                                                                                    • OpenClipboard.USER32 ref: 00416997
                                                                                    • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                                    • CloseClipboard.USER32 ref: 004169BF
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                    • String ID: !D@
                                                                                    • API String ID: 2172192267-604454484
                                                                                    • Opcode ID: 6158417b4941dc5375a5e767acdf09c410ea26a48d20f9adfcefd8670d51feb0
                                                                                    • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                                                                    • Opcode Fuzzy Hash: 6158417b4941dc5375a5e767acdf09c410ea26a48d20f9adfcefd8670d51feb0
                                                                                    • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                    • String ID:
                                                                                    • API String ID: 221034970-0
                                                                                    • Opcode ID: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                                    • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                                                                    • Opcode Fuzzy Hash: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                                    • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 100059EA
                                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                    • _free.LIBCMT ref: 100059F6
                                                                                    • _free.LIBCMT ref: 10005A01
                                                                                    • _free.LIBCMT ref: 10005A0C
                                                                                    • _free.LIBCMT ref: 10005A17
                                                                                    • _free.LIBCMT ref: 10005A22
                                                                                    • _free.LIBCMT ref: 10005A2D
                                                                                    • _free.LIBCMT ref: 10005A38
                                                                                    • _free.LIBCMT ref: 10005A43
                                                                                    • _free.LIBCMT ref: 10005A51
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                    • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                    • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                    • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 004481B5
                                                                                      • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                    • _free.LIBCMT ref: 004481C1
                                                                                    • _free.LIBCMT ref: 004481CC
                                                                                    • _free.LIBCMT ref: 004481D7
                                                                                    • _free.LIBCMT ref: 004481E2
                                                                                    • _free.LIBCMT ref: 004481ED
                                                                                    • _free.LIBCMT ref: 004481F8
                                                                                    • _free.LIBCMT ref: 00448203
                                                                                    • _free.LIBCMT ref: 0044820E
                                                                                    • _free.LIBCMT ref: 0044821C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                                    • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                                                                    • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                                    • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Eventinet_ntoa
                                                                                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                                    • API String ID: 3578746661-3604713145
                                                                                    • Opcode ID: c30e06cd888737f0853dc7cde16cc6a0e7c10f9b796ab7cbb132ff3211f62e7c
                                                                                    • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                                                                    • Opcode Fuzzy Hash: c30e06cd888737f0853dc7cde16cc6a0e7c10f9b796ab7cbb132ff3211f62e7c
                                                                                    • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                                                                    APIs
                                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DecodePointer
                                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                    • API String ID: 3527080286-3064271455
                                                                                    • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                                    • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                                                                                    • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                                    • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                                                                                    APIs
                                                                                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                                                                      • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                                                    • Sleep.KERNEL32(00000064), ref: 0041755C
                                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CreateDeleteExecuteShellSleep
                                                                                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                    • API String ID: 1462127192-2001430897
                                                                                    • Opcode ID: c26ca4c87e0ccd669d10d3c950283e4e6b787544283b11279bcdf97ce098c4cf
                                                                                    • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                                                                    • Opcode Fuzzy Hash: c26ca4c87e0ccd669d10d3c950283e4e6b787544283b11279bcdf97ce098c4cf
                                                                                    • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                                                                    • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe), ref: 004074D9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CurrentProcess
                                                                                    • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                                    • API String ID: 2050909247-4242073005
                                                                                    • Opcode ID: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                                                    • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                                                                    • Opcode Fuzzy Hash: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                                                    • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                                                                    APIs
                                                                                    • _strftime.LIBCMT ref: 00401D50
                                                                                      • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                    • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                                                                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                    • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                                    • API String ID: 3809562944-243156785
                                                                                    • Opcode ID: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                                                                                    • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                                                                    • Opcode Fuzzy Hash: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                                                                                    • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                                                                    • int.LIBCPMT ref: 00410EBC
                                                                                      • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                                      • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                                                                    • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                                    • String ID: ,kG$0kG
                                                                                    • API String ID: 3815856325-2015055088
                                                                                    • Opcode ID: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                                    • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                                                                    • Opcode Fuzzy Hash: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                                    • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                                                                    APIs
                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                                    • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                                                                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                                    • waveInStart.WINMM ref: 00401CFE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                    • String ID: dMG$|MG$PG
                                                                                    • API String ID: 1356121797-532278878
                                                                                    • Opcode ID: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                                    • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                                                                    • Opcode Fuzzy Hash: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                                    • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                                    APIs
                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                                                                      • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                                                      • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                                                      • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                                                                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                                                                    • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                                                                    • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                                                                    • TranslateMessage.USER32(?), ref: 0041D57A
                                                                                    • DispatchMessageA.USER32(?), ref: 0041D584
                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                    • String ID: Remcos
                                                                                    • API String ID: 1970332568-165870891
                                                                                    • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                                    • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                                                                    • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                                    • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                                                                                    • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                                                                    • Opcode Fuzzy Hash: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                                                                                    • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(?,?), ref: 00453EAF
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453F32
                                                                                    • __alloca_probe_16.LIBCMT ref: 00453F6A
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00453FC5
                                                                                    • __alloca_probe_16.LIBCMT ref: 00454014
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00453FDC
                                                                                      • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00454058
                                                                                    • __freea.LIBCMT ref: 00454083
                                                                                    • __freea.LIBCMT ref: 0045408F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                    • String ID:
                                                                                    • API String ID: 201697637-0
                                                                                    • Opcode ID: 60ef2ba7967959a3bb5abb213fcabd91113b8325e5b7fdcf5ca33ed2e0ecdaf3
                                                                                    • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                                                                    • Opcode Fuzzy Hash: 60ef2ba7967959a3bb5abb213fcabd91113b8325e5b7fdcf5ca33ed2e0ecdaf3
                                                                                    • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                                                                    APIs
                                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                    • String ID:
                                                                                    • API String ID: 1454806937-0
                                                                                    • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                    • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                    • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                    • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                    APIs
                                                                                      • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                      • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                      • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                      • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                    • _memcmp.LIBVCRUNTIME ref: 004454A4
                                                                                    • _free.LIBCMT ref: 00445515
                                                                                    • _free.LIBCMT ref: 0044552E
                                                                                    • _free.LIBCMT ref: 00445560
                                                                                    • _free.LIBCMT ref: 00445569
                                                                                    • _free.LIBCMT ref: 00445575
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorLast$_abort_memcmp
                                                                                    • String ID: C
                                                                                    • API String ID: 1679612858-1037565863
                                                                                    • Opcode ID: 6f1d39b58dd635c4ed11e96029a3cbcd4864377c401e683a9a2b4ff7d9f0077f
                                                                                    • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                                                                    • Opcode Fuzzy Hash: 6f1d39b58dd635c4ed11e96029a3cbcd4864377c401e683a9a2b4ff7d9f0077f
                                                                                    • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: tcp$udp
                                                                                    • API String ID: 0-3725065008
                                                                                    • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                                    • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                                                                    • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                                    • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                                                                    APIs
                                                                                    • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                                    • ExitThread.KERNEL32 ref: 004018F6
                                                                                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                                                      • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                    • String ID: PkG$XMG$NG$NG
                                                                                    • API String ID: 1649129571-3151166067
                                                                                    • Opcode ID: 75012875e451908b35632db0314ac4bd8f8122bfc896b2da79bdd81802b13c9d
                                                                                    • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                                                                    • Opcode Fuzzy Hash: 75012875e451908b35632db0314ac4bd8f8122bfc896b2da79bdd81802b13c9d
                                                                                    • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                                                                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                                                                                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                                                                                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                                                                      • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                                      • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                    • String ID: .part
                                                                                    • API String ID: 1303771098-3499674018
                                                                                    • Opcode ID: 7f2eb078ac992df691b3da3407943ec924cae91aadcffbe3be428360bcaba3f1
                                                                                    • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                                                                    • Opcode Fuzzy Hash: 7f2eb078ac992df691b3da3407943ec924cae91aadcffbe3be428360bcaba3f1
                                                                                    • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                                                                    APIs
                                                                                    • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                                                                    • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                                                    • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                                    • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Console$Window$AllocOutputShow
                                                                                    • String ID: Remcos v$5.1.2 Pro$CONOUT$
                                                                                    • API String ID: 4067487056-1584637518
                                                                                    • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                                    • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                                                                    • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                                    • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                                                                                    • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                                                                                    • __alloca_probe_16.LIBCMT ref: 0044AE40
                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                                                                    • __freea.LIBCMT ref: 0044AEB0
                                                                                      • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                    • __freea.LIBCMT ref: 0044AEB9
                                                                                    • __freea.LIBCMT ref: 0044AEDE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 3864826663-0
                                                                                    • Opcode ID: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                                                                                    • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                                                                    • Opcode Fuzzy Hash: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                                                                                    • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                                                                    APIs
                                                                                    • SendInput.USER32 ref: 00419A25
                                                                                    • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                                                                    • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                                                                      • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InputSend$Virtual
                                                                                    • String ID:
                                                                                    • API String ID: 1167301434-0
                                                                                    • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                                    • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                                                                    • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                                    • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16_free
                                                                                    • String ID: a/p$am/pm$h{D
                                                                                    • API String ID: 2936374016-2303565833
                                                                                    • Opcode ID: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                                                                                    • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                                                                    • Opcode Fuzzy Hash: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                                                                                    • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                                                                    APIs
                                                                                      • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                    • _free.LIBCMT ref: 00444E87
                                                                                    • _free.LIBCMT ref: 00444E9E
                                                                                    • _free.LIBCMT ref: 00444EBD
                                                                                    • _free.LIBCMT ref: 00444ED8
                                                                                    • _free.LIBCMT ref: 00444EEF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$AllocateHeap
                                                                                    • String ID: KED
                                                                                    • API String ID: 3033488037-2133951994
                                                                                    • Opcode ID: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                                                                                    • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                                                                    • Opcode Fuzzy Hash: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                                                                                    • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                                                                    APIs
                                                                                    • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Enum$InfoQueryValue
                                                                                    • String ID: [regsplt]$xUG$TG
                                                                                    • API String ID: 3554306468-1165877943
                                                                                    • Opcode ID: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                                                                                    • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                                                                    • Opcode Fuzzy Hash: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                                                                                    • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                                                                    APIs
                                                                                    • GetConsoleCP.KERNEL32 ref: 100094D4
                                                                                    • __fassign.LIBCMT ref: 1000954F
                                                                                    • __fassign.LIBCMT ref: 1000956A
                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 100095AF
                                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 100095E8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1324828854-0
                                                                                    • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                    • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                    • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                    • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                    APIs
                                                                                    • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                                                                                    • __fassign.LIBCMT ref: 0044B4F9
                                                                                    • __fassign.LIBCMT ref: 0044B514
                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                                                                    • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B559
                                                                                    • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B592
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 1324828854-0
                                                                                    • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                                    • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                                                                    • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                                    • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                                                                    APIs
                                                                                    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                                                                      • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                                      • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseEnumInfoOpenQuerysend
                                                                                    • String ID: xUG$NG$NG$TG
                                                                                    • API String ID: 3114080316-2811732169
                                                                                    • Opcode ID: 7cc9ab8d1ca6eb641b19e512414f72db0f0c1a01730ddac8befa0b981732df1d
                                                                                    • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                                                                    • Opcode Fuzzy Hash: 7cc9ab8d1ca6eb641b19e512414f72db0f0c1a01730ddac8befa0b981732df1d
                                                                                    • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                    • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                    • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                    • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                    APIs
                                                                                      • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                                                                      • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                                                      • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                                                      • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                      • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                    • _wcslen.LIBCMT ref: 0041B7F4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                                    • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                                    • API String ID: 3286818993-122982132
                                                                                    • Opcode ID: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                                    • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                                                                    • Opcode Fuzzy Hash: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                                    • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                                                                    APIs
                                                                                      • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                      • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                                                      • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                    • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                                                                    • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                    • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                    • API String ID: 1133728706-4073444585
                                                                                    • Opcode ID: fca4e0d28d89a9fa445d0ae1acaca183aa99da9c1d1975f14c0158772a6bba34
                                                                                    • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                                                                    • Opcode Fuzzy Hash: fca4e0d28d89a9fa445d0ae1acaca183aa99da9c1d1975f14c0158772a6bba34
                                                                                    • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                                                                                    • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                                                                    • Opcode Fuzzy Hash: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                                                                                    • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041C508
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseHandle$CreatePointerWrite
                                                                                    • String ID: xpF
                                                                                    • API String ID: 1852769593-354647465
                                                                                    • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                                    • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                                                                    • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                                    • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                                                                                    APIs
                                                                                      • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                    • _free.LIBCMT ref: 100092AB
                                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                    • _free.LIBCMT ref: 100092B6
                                                                                    • _free.LIBCMT ref: 100092C1
                                                                                    • _free.LIBCMT ref: 10009315
                                                                                    • _free.LIBCMT ref: 10009320
                                                                                    • _free.LIBCMT ref: 1000932B
                                                                                    • _free.LIBCMT ref: 10009336
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                    • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                    • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                    • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                    APIs
                                                                                      • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                                                                    • _free.LIBCMT ref: 00450FC8
                                                                                      • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                    • _free.LIBCMT ref: 00450FD3
                                                                                    • _free.LIBCMT ref: 00450FDE
                                                                                    • _free.LIBCMT ref: 00451032
                                                                                    • _free.LIBCMT ref: 0045103D
                                                                                    • _free.LIBCMT ref: 00451048
                                                                                    • _free.LIBCMT ref: 00451053
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                    • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                                                                    • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                    • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                                                                    • int.LIBCPMT ref: 004111BE
                                                                                      • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                                      • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                                    • std::_Facet_Register.LIBCPMT ref: 004111FE
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                    • String ID: (mG
                                                                                    • API String ID: 2536120697-4059303827
                                                                                    • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                                    • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                                                                    • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                                    • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                                                                    • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                                    • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                                                                    • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                                    • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                                                                    APIs
                                                                                    • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe), ref: 0040760B
                                                                                      • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                                                                      • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                                    • CoUninitialize.OLE32 ref: 00407664
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InitializeObjectUninitialize_wcslen
                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                    • API String ID: 3851391207-1840432179
                                                                                    • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                                    • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                                                                    • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                                    • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                                                                    APIs
                                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                                                                    • GetLastError.KERNEL32 ref: 0040BB22
                                                                                    Strings
                                                                                    • UserProfile, xrefs: 0040BAE8
                                                                                    • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                                                                    • [Chrome Cookies not found], xrefs: 0040BB3C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DeleteErrorFileLast
                                                                                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                    • API String ID: 2018770650-304995407
                                                                                    • Opcode ID: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                                                                                    • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                                                                    • Opcode Fuzzy Hash: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                                                                                    • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                                                                    APIs
                                                                                    • __allrem.LIBCMT ref: 0043ACE9
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                                                                    • __allrem.LIBCMT ref: 0043AD1C
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                                                                    • __allrem.LIBCMT ref: 0043AD51
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                    • String ID:
                                                                                    • API String ID: 1992179935-0
                                                                                    • Opcode ID: 52068ab3a7cfe922dfe01ed446ba536eb0656cd97dd847f62b494b0202e28e08
                                                                                    • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                                                                    • Opcode Fuzzy Hash: 52068ab3a7cfe922dfe01ed446ba536eb0656cd97dd847f62b494b0202e28e08
                                                                                    • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                    • __freea.LIBCMT ref: 10008A08
                                                                                      • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                    • __freea.LIBCMT ref: 10008A11
                                                                                    • __freea.LIBCMT ref: 10008A36
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1414292761-0
                                                                                    • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                    • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                    • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                    • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                                                                                      • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: H_prologSleep
                                                                                    • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                                    • API String ID: 3469354165-3054508432
                                                                                    • Opcode ID: 2e5d6e08581b10737c1bb2560247fa09f1eecb3977a7ed5534b3d475155fd4f7
                                                                                    • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                                                                    • Opcode Fuzzy Hash: 2e5d6e08581b10737c1bb2560247fa09f1eecb3977a7ed5534b3d475155fd4f7
                                                                                    • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __cftoe
                                                                                    • String ID:
                                                                                    • API String ID: 4189289331-0
                                                                                    • Opcode ID: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                                                                                    • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                                                                    • Opcode Fuzzy Hash: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                                                                                    • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                                                                    APIs
                                                                                    • _strlen.LIBCMT ref: 10001607
                                                                                    • _strcat.LIBCMT ref: 1000161D
                                                                                    • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1000165A
                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                    • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 10001686
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                    • String ID:
                                                                                    • API String ID: 1922816806-0
                                                                                    • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                    • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                    • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                    • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                    APIs
                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 10001038
                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$AttributesFilelstrcat
                                                                                    • String ID:
                                                                                    • API String ID: 3594823470-0
                                                                                    • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                    • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                    • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                    • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                                                                    • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                    • String ID:
                                                                                    • API String ID: 493672254-0
                                                                                    • Opcode ID: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                                    • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                                                                    • Opcode Fuzzy Hash: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                                    • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                    • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                    • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                    • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                    • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                    • _free.LIBCMT ref: 10005B2D
                                                                                    • _free.LIBCMT ref: 10005B55
                                                                                    • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                    • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                    • _abort.LIBCMT ref: 10005B74
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                    • String ID:
                                                                                    • API String ID: 3160817290-0
                                                                                    • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                    • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                    • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                    • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                    • _free.LIBCMT ref: 004482CC
                                                                                    • _free.LIBCMT ref: 004482F4
                                                                                    • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                    • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                    • _abort.LIBCMT ref: 00448313
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                    • String ID:
                                                                                    • API String ID: 3160817290-0
                                                                                    • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                                    • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                                                                    • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                                    • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                    • String ID:
                                                                                    • API String ID: 221034970-0
                                                                                    • Opcode ID: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                                    • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                                                                    • Opcode Fuzzy Hash: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                                    • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                                                                    • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                    • String ID:
                                                                                    • API String ID: 221034970-0
                                                                                    • Opcode ID: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                                    • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                                                                    • Opcode Fuzzy Hash: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                                    • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                                                                    APIs
                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                                                                    • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                    • String ID:
                                                                                    • API String ID: 221034970-0
                                                                                    • Opcode ID: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                                    • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                                                                    • Opcode Fuzzy Hash: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                                    • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID: @^E
                                                                                    • API String ID: 269201875-2908066071
                                                                                    • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                                    • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                                                                    • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                                    • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                                                                    APIs
                                                                                      • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                      • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                      • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                      • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                      • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                      • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                      • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                    • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                    • API String ID: 4036392271-1520055953
                                                                                    • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                    • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                    • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                    • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                    APIs
                                                                                    • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B1AD
                                                                                    • wsprintfW.USER32 ref: 0040B22E
                                                                                      • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: EventLocalTimewsprintf
                                                                                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                                    • API String ID: 1497725170-248792730
                                                                                    • Opcode ID: e3693a350b1622166f97d02a0b5d86e181ebd5c9cb8161137e773e05ea357f11
                                                                                    • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                                                                    • Opcode Fuzzy Hash: e3693a350b1622166f97d02a0b5d86e181ebd5c9cb8161137e773e05ea357f11
                                                                                    • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                                    • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CloseCreateHandleSizeSleep
                                                                                    • String ID: XQG
                                                                                    • API String ID: 1958988193-3606453820
                                                                                    • Opcode ID: 3b1a01b47bddebb3752f31eb226f8e532d480515b9e880c3ec3420bf47c2c25d
                                                                                    • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                                                                    • Opcode Fuzzy Hash: 3b1a01b47bddebb3752f31eb226f8e532d480515b9e880c3ec3420bf47c2c25d
                                                                                    • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                                                                                    APIs
                                                                                    • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                                                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                                                    • GetLastError.KERNEL32 ref: 0041D611
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ClassCreateErrorLastRegisterWindow
                                                                                    • String ID: 0$MsgWindowClass
                                                                                    • API String ID: 2877667751-2410386613
                                                                                    • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                                    • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                                                                    • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                                    • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                                                                    APIs
                                                                                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                                                                    • CloseHandle.KERNEL32(?), ref: 004077E5
                                                                                    • CloseHandle.KERNEL32(?), ref: 004077EA
                                                                                    Strings
                                                                                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                                                                    • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseHandle$CreateProcess
                                                                                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                    • API String ID: 2922976086-4183131282
                                                                                    • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                                    • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                                                                    • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                                    • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                                                                    Strings
                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, xrefs: 004076FF
                                                                                    • Rmc-9XV80Z, xrefs: 00407715
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$Rmc-9XV80Z
                                                                                    • API String ID: 0-1840856439
                                                                                    • Opcode ID: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                                    • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                                                                    • Opcode Fuzzy Hash: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                                    • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                    • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                    • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                    • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                                    • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                                                                    • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                                    • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                                                                    APIs
                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                                                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                    • String ID: KeepAlive | Disabled
                                                                                    • API String ID: 2993684571-305739064
                                                                                    • Opcode ID: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                                    • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                                                                    • Opcode Fuzzy Hash: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                                    • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                                                                    APIs
                                                                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                                                                    • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                                                                    • Sleep.KERNEL32(00002710), ref: 0041AE98
                                                                                    • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                    • String ID: Alarm triggered
                                                                                    • API String ID: 614609389-2816303416
                                                                                    • Opcode ID: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                                    • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                                                                    • Opcode Fuzzy Hash: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                                    • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                                                                    APIs
                                                                                    • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                                                                    • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                                                                                    • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                                                                                    • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                                                                                    Strings
                                                                                    • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                    • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                    • API String ID: 3024135584-2418719853
                                                                                    • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                                    • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                                                                    • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                                    • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                                    • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                                                                    • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                                    • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                                                                    APIs
                                                                                      • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                      • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                                                                      • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                                                                      • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C096
                                                                                      • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                      • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                    • String ID:
                                                                                    • API String ID: 2180151492-0
                                                                                    • Opcode ID: f543a937552f8da93e04a19db783a22fe456a5d43be0b6fbf0d05b22cfeed181
                                                                                    • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                                                                    • Opcode Fuzzy Hash: f543a937552f8da93e04a19db783a22fe456a5d43be0b6fbf0d05b22cfeed181
                                                                                    • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free
                                                                                    • String ID:
                                                                                    • API String ID: 269201875-0
                                                                                    • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                                    • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                                                                    • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                                    • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                                                                                    • __alloca_probe_16.LIBCMT ref: 00451231
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                                                                                    • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                                                                                    • __freea.LIBCMT ref: 0045129D
                                                                                      • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                    • String ID:
                                                                                    • API String ID: 313313983-0
                                                                                    • Opcode ID: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                                                                                    • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                                                                    • Opcode Fuzzy Hash: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                                                                                    • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                      • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                    • _free.LIBCMT ref: 100071B8
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                    • String ID:
                                                                                    • API String ID: 336800556-0
                                                                                    • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                    • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                    • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                    • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                    APIs
                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                                                                      • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                                                                    • _free.LIBCMT ref: 0044F43F
                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                    • String ID:
                                                                                    • API String ID: 336800556-0
                                                                                    • Opcode ID: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                                                                                    • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                                                                    • Opcode Fuzzy Hash: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                                                                                    • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                    • _free.LIBCMT ref: 10005BB4
                                                                                    • _free.LIBCMT ref: 10005BDB
                                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free
                                                                                    • String ID:
                                                                                    • API String ID: 3170660625-0
                                                                                    • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                    • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                    • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                    • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                                                                                    • _free.LIBCMT ref: 00448353
                                                                                    • _free.LIBCMT ref: 0044837A
                                                                                    • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                                                                                    • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$_free
                                                                                    • String ID:
                                                                                    • API String ID: 3170660625-0
                                                                                    • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                                    • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                                                                    • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                                    • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                                                                    APIs
                                                                                    • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                    • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CloseHandleOpen$FileImageName
                                                                                    • String ID:
                                                                                    • API String ID: 2951400881-0
                                                                                    • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                                    • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                                                                    • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                                    • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                                                                    APIs
                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                    • lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                    • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                    • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                    • lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrlen$lstrcat
                                                                                    • String ID:
                                                                                    • API String ID: 493641738-0
                                                                                    • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                    • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                    • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                    • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 100091D0
                                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                    • _free.LIBCMT ref: 100091E2
                                                                                    • _free.LIBCMT ref: 100091F4
                                                                                    • _free.LIBCMT ref: 10009206
                                                                                    • _free.LIBCMT ref: 10009218
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                    • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                    • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                    • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 00450A54
                                                                                      • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                    • _free.LIBCMT ref: 00450A66
                                                                                    • _free.LIBCMT ref: 00450A78
                                                                                    • _free.LIBCMT ref: 00450A8A
                                                                                    • _free.LIBCMT ref: 00450A9C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                    • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                                                                    • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                    • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 1000536F
                                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                    • _free.LIBCMT ref: 10005381
                                                                                    • _free.LIBCMT ref: 10005394
                                                                                    • _free.LIBCMT ref: 100053A5
                                                                                    • _free.LIBCMT ref: 100053B6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                    • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                    • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                    • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 00444106
                                                                                      • Part of subcall function 00446802: RtlFreeHeap.NTDLL(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                                                      • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                    • _free.LIBCMT ref: 00444118
                                                                                    • _free.LIBCMT ref: 0044412B
                                                                                    • _free.LIBCMT ref: 0044413C
                                                                                    • _free.LIBCMT ref: 0044414D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                    • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                                                                    • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                    • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                                                                    APIs
                                                                                    • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                                                                      • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00B4CC78,00000010), ref: 004048E0
                                                                                      • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                                                                      • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                                    • String ID: XQG$NG$PG
                                                                                    • API String ID: 1634807452-3565412412
                                                                                    • Opcode ID: 37f92f9e228d7867ca8ec414e4020a2be5fb0e4e7ea8d22ac4a01dfcb157deff
                                                                                    • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                                                                    • Opcode Fuzzy Hash: 37f92f9e228d7867ca8ec414e4020a2be5fb0e4e7ea8d22ac4a01dfcb157deff
                                                                                    • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                                                                    APIs
                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000104), ref: 10004C1D
                                                                                    • _free.LIBCMT ref: 10004CE8
                                                                                    • _free.LIBCMT ref: 10004CF2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _free$FileModuleName
                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                    • API String ID: 2506810119-4083458154
                                                                                    • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                    • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                    • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                    • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                    APIs
                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe,00000104), ref: 00443515
                                                                                    • _free.LIBCMT ref: 004435E0
                                                                                    • _free.LIBCMT ref: 004435EA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$FileModuleName
                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                    • API String ID: 2506810119-4083458154
                                                                                    • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                                    • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                                                                    • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                                    • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                                                                    APIs
                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                                      • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                      • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                                                      • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                                                      • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                                                    • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                    • String ID: /sort "Visit Time" /stext "$0NG
                                                                                    • API String ID: 368326130-3219657780
                                                                                    • Opcode ID: 42fad630e19f3c38e86c957dd067bc9dee37e6c80826256453ec7df99fba979c
                                                                                    • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                                                                    • Opcode Fuzzy Hash: 42fad630e19f3c38e86c957dd067bc9dee37e6c80826256453ec7df99fba979c
                                                                                    • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                                                                    APIs
                                                                                    • _wcslen.LIBCMT ref: 00416330
                                                                                      • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                      • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                                                      • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                                                      • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _wcslen$CloseCreateValue
                                                                                    • String ID: !D@$okmode$PG
                                                                                    • API String ID: 3411444782-3370592832
                                                                                    • Opcode ID: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                                                                                    • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                                                                    • Opcode Fuzzy Hash: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                                                                                    • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                                                                    APIs
                                                                                      • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                                                                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                                                                                    Strings
                                                                                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                                                                    • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExistsFilePath
                                                                                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                    • API String ID: 1174141254-1980882731
                                                                                    • Opcode ID: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                                    • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                                                                    • Opcode Fuzzy Hash: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                                    • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                                                                    APIs
                                                                                      • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                                                                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                                                                                    Strings
                                                                                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                                                                    • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExistsFilePath
                                                                                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                    • API String ID: 1174141254-1980882731
                                                                                    • Opcode ID: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                                    • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                                                                    • Opcode Fuzzy Hash: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                                    • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                                                                    APIs
                                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A2A2,?,00000000,00000000), ref: 0040A249
                                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A2C4,?,00000000,00000000), ref: 0040A255
                                                                                      • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B1AD
                                                                                      • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateThread$LocalTimewsprintf
                                                                                    • String ID: Offline Keylogger Started
                                                                                    • API String ID: 465354869-4114347211
                                                                                    • Opcode ID: d2c6c6b1c115abd6082bc8f8898abe3c453afa196391d6f5d8e81b2196ab674b
                                                                                    • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                                                                    • Opcode Fuzzy Hash: d2c6c6b1c115abd6082bc8f8898abe3c453afa196391d6f5d8e81b2196ab674b
                                                                                    • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                                                                    APIs
                                                                                      • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B1AD
                                                                                      • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                                                                                    • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateThread$LocalTime$wsprintf
                                                                                    • String ID: Online Keylogger Started
                                                                                    • API String ID: 112202259-1258561607
                                                                                    • Opcode ID: f3d6b4abe48f6a11fbf35fca459408289a3e67c664991f394f7c553c248ea070
                                                                                    • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                                                                    • Opcode Fuzzy Hash: f3d6b4abe48f6a11fbf35fca459408289a3e67c664991f394f7c553c248ea070
                                                                                    • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: CryptUnprotectData$crypt32
                                                                                    • API String ID: 2574300362-2380590389
                                                                                    • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                                    • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                                                                    • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                                    • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                                                                    APIs
                                                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                                    • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                                    • SetEvent.KERNEL32(?), ref: 004051D9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseEventHandleObjectSingleWait
                                                                                    • String ID: Connection Timeout
                                                                                    • API String ID: 2055531096-499159329
                                                                                    • Opcode ID: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                                    • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                                                                    • Opcode Fuzzy Hash: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                                    • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                                                                    APIs
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Exception@8Throw
                                                                                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                    • API String ID: 2005118841-1866435925
                                                                                    • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                                    • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                                                                    • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                                    • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                                                                    APIs
                                                                                    • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041385A
                                                                                    • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F85E,pth_unenc,004752D8), ref: 00413888
                                                                                    • RegCloseKey.ADVAPI32(004752D8,?,0040F85E,pth_unenc,004752D8), ref: 00413893
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseCreateValue
                                                                                    • String ID: pth_unenc
                                                                                    • API String ID: 1818849710-4028850238
                                                                                    • Opcode ID: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                                    • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                                                                    • Opcode Fuzzy Hash: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                                    • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                                                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                                                                      • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                                                                      • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                    • String ID: bad locale name
                                                                                    • API String ID: 3628047217-1405518554
                                                                                    • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                                    • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                                                                    • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                                    • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                                                                    APIs
                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                                                                    • ShowWindow.USER32(00000009), ref: 00416C9C
                                                                                    • SetForegroundWindow.USER32 ref: 00416CA8
                                                                                      • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                                                                      • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                                                      • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                                      • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                                                    • String ID: !D@
                                                                                    • API String ID: 186401046-604454484
                                                                                    • Opcode ID: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                                                                                    • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                                                                    • Opcode Fuzzy Hash: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                                                                                    • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                                                                    APIs
                                                                                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExecuteShell
                                                                                    • String ID: /C $cmd.exe$open
                                                                                    • API String ID: 587946157-3896048727
                                                                                    • Opcode ID: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                                    • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                                                                    • Opcode Fuzzy Hash: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                                    • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                                                                    APIs
                                                                                    • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                    • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                                                    • TerminateThread.KERNEL32(0040A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: TerminateThread$HookUnhookWindows
                                                                                    • String ID: pth_unenc
                                                                                    • API String ID: 3123878439-4028850238
                                                                                    • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                                    • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                                                                                    • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                                    • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: GetCursorInfo$User32.dll
                                                                                    • API String ID: 1646373207-2714051624
                                                                                    • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                                    • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                                                                                    • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                                    • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID: GetLastInputInfo$User32.dll
                                                                                    • API String ID: 2574300362-1519888992
                                                                                    • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                                    • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                                                                                    • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                                    • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __alldvrm$_strrchr
                                                                                    • String ID:
                                                                                    • API String ID: 1036877536-0
                                                                                    • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                                    • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                                                                    • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                                    • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                                    • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                                                                    • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                                    • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                    • __freea.LIBCMT ref: 100087D5
                                                                                      • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                    • String ID:
                                                                                    • API String ID: 2652629310-0
                                                                                    • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                    • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                    • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                    • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                    APIs
                                                                                    Strings
                                                                                    • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                                                                    • Cleared browsers logins and cookies., xrefs: 0040C130
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Sleep
                                                                                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                    • API String ID: 3472027048-1236744412
                                                                                    • Opcode ID: 89087982b9f18f6ed7126e8e60e6f0f46d4aef64b1045ae46dea68bdf68e8d8b
                                                                                    • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                                                                    • Opcode Fuzzy Hash: 89087982b9f18f6ed7126e8e60e6f0f46d4aef64b1045ae46dea68bdf68e8d8b
                                                                                    • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                                                                    APIs
                                                                                    • EnumDisplayMonitors.USER32(00000000,00000000,0041960A,00000000), ref: 00419530
                                                                                    • EnumDisplayDevicesW.USER32(?), ref: 00419560
                                                                                    • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004195D5
                                                                                    • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195F2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DisplayEnum$Devices$Monitors
                                                                                    • String ID:
                                                                                    • API String ID: 1432082543-0
                                                                                    • Opcode ID: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                                                                                    • Instruction ID: 2d7c1ce958f8de7f9ce17d43b909e87ea7509c435c2805f0bc90a8abde121c81
                                                                                    • Opcode Fuzzy Hash: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                                                                                    • Instruction Fuzzy Hash: 232180721083146BD221DF26DC89EABBBECEBD1754F00053FF45AD3190EB749A49C66A
                                                                                    APIs
                                                                                      • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                                                                      • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                                                                      • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                                                                                    • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                                                                    • Sleep.KERNEL32(00000064), ref: 0040A638
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Window$SleepText$ForegroundLength
                                                                                    • String ID: [ $ ]
                                                                                    • API String ID: 3309952895-93608704
                                                                                    • Opcode ID: e3c1de537be80067876ef70e6a789dfde08fa912f151d6d6ce86b7d0ea258fd3
                                                                                    • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                                                                    • Opcode Fuzzy Hash: e3c1de537be80067876ef70e6a789dfde08fa912f151d6d6ce86b7d0ea258fd3
                                                                                    • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: SystemTimes$Sleep__aulldiv
                                                                                    • String ID:
                                                                                    • API String ID: 188215759-0
                                                                                    • Opcode ID: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                                                    • Instruction ID: 634937a4cd8d43e921f59083ecd148feda9109121ee8127270144c35be039893
                                                                                    • Opcode Fuzzy Hash: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                                                    • Instruction Fuzzy Hash: D01133B35043456BC304EAB5CD85DEF779CEBC4358F040A3EF64982061EE29E94986A6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                                    • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                                                                    • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                                    • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                                    • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                                                                    • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                                    • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                    • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 3177248105-0
                                                                                    • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                    • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                    • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                    • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                                                                    • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 3177248105-0
                                                                                    • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                                    • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                                                                    • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                                    • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                                                                    APIs
                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                                                                      • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                                                                    • _UnwindNestedFrames.LIBCMT ref: 00439911
                                                                                    • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                    • String ID:
                                                                                    • API String ID: 2633735394-0
                                                                                    • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                    • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                                                                    • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                    • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                                                                    APIs
                                                                                    • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                                                                                    • GetSystemMetrics.USER32(0000004D), ref: 00419431
                                                                                    • GetSystemMetrics.USER32(0000004E), ref: 00419437
                                                                                    • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem
                                                                                    • String ID:
                                                                                    • API String ID: 4116985748-0
                                                                                    • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                    • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                                                                    • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                    • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                                                                    APIs
                                                                                    • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                                                                    • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                                                                    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                                                                      • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                                                                    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                    • String ID:
                                                                                    • API String ID: 1761009282-0
                                                                                    • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                    • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                                                                    • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                    • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                                                                    APIs
                                                                                    • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorHandling__start
                                                                                    • String ID: pow
                                                                                    • API String ID: 3213639722-2276729525
                                                                                    • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                                    • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                                                                    • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                                    • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                                                                    APIs
                                                                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418AF9
                                                                                      • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                                                    • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                                                                                      • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                                                      • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                    • String ID: image/jpeg
                                                                                    • API String ID: 1291196975-3785015651
                                                                                    • Opcode ID: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                                                                                    • Instruction ID: 4d0b5c8bb5c89928ccad9adfa1773eea8e0f3015d74a4b244142dc53e7d0f70c
                                                                                    • Opcode Fuzzy Hash: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                                                                                    • Instruction Fuzzy Hash: B5316D71604300AFC301EF65C884DAFBBE9EF8A304F00496EF985A7251DB7999048BA6
                                                                                    APIs
                                                                                      • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                    • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Init_thread_footer__onexit
                                                                                    • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                                    • API String ID: 1881088180-3686566968
                                                                                    • Opcode ID: 0ad70d16419787131355c48921a2e9415c0e2ce86788bdce81e29916b0442688
                                                                                    • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                                                                    • Opcode Fuzzy Hash: 0ad70d16419787131355c48921a2e9415c0e2ce86788bdce81e29916b0442688
                                                                                    • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                                                                    APIs
                                                                                    • GetACP.KERNEL32(?,20001004,?,00000002), ref: 00451C92
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ACP$OCP
                                                                                    • API String ID: 0-711371036
                                                                                    • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                                    • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                                                                    • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                                    • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                                                                    APIs
                                                                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BE5
                                                                                      • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418C0A
                                                                                      • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                                                      • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                    • String ID: image/png
                                                                                    • API String ID: 1291196975-2966254431
                                                                                    • Opcode ID: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                                                                                    • Instruction ID: 3c300d9a249dbea914adbc87700f03e6b767f6cab6163cd9bde1f728fb98d86d
                                                                                    • Opcode Fuzzy Hash: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                                                                                    • Instruction Fuzzy Hash: ED219071204211AFC701AB61CC88CBFBBACEFCA754F10052EF54693261DB399955CBA6
                                                                                    APIs
                                                                                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                                                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                                                                    Strings
                                                                                    • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LocalTime
                                                                                    • String ID: KeepAlive | Enabled | Timeout:
                                                                                    • API String ID: 481472006-1507639952
                                                                                    • Opcode ID: f2468334df4898d6ef002f637467a9298724a05ae75baec3b5dadd2c5d5b47a3
                                                                                    • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                                                                    • Opcode Fuzzy Hash: f2468334df4898d6ef002f637467a9298724a05ae75baec3b5dadd2c5d5b47a3
                                                                                    • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                                                                    APIs
                                                                                    • Sleep.KERNEL32 ref: 0041667B
                                                                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DownloadFileSleep
                                                                                    • String ID: !D@
                                                                                    • API String ID: 1931167962-604454484
                                                                                    • Opcode ID: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                                                                                    • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                                                                    • Opcode Fuzzy Hash: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                                                                                    • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strlen
                                                                                    • String ID: : $Se.
                                                                                    • API String ID: 4218353326-4089948878
                                                                                    • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                    • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                    • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                    • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                    APIs
                                                                                    • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LocalTime
                                                                                    • String ID: | $%02i:%02i:%02i:%03i
                                                                                    • API String ID: 481472006-2430845779
                                                                                    • Opcode ID: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                                                                                    • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                                                                    • Opcode Fuzzy Hash: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                                                                                    • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                                                                    APIs
                                                                                    • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExistsFilePath
                                                                                    • String ID: alarm.wav$hYG
                                                                                    • API String ID: 1174141254-2782910960
                                                                                    • Opcode ID: c33133716f3583514484f1a0064d378350e756f85b2d97b44799916b9c9127a1
                                                                                    • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                                                                    • Opcode Fuzzy Hash: c33133716f3583514484f1a0064d378350e756f85b2d97b44799916b9c9127a1
                                                                                    • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                                                                    APIs
                                                                                      • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B1AD
                                                                                      • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                      • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                    • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                                                                    • UnhookWindowsHookEx.USER32 ref: 0040B102
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                    • String ID: Online Keylogger Stopped
                                                                                    • API String ID: 1623830855-1496645233
                                                                                    • Opcode ID: af233fb170c3e7993f7e935a79561d089458a16838c3db048d5fa7cce78358a9
                                                                                    • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                                                                    • Opcode Fuzzy Hash: af233fb170c3e7993f7e935a79561d089458a16838c3db048d5fa7cce78358a9
                                                                                    • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                                                                    APIs
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                      • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4116939423.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4116923240.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4116939423.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_10000000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                                    • String ID: Unknown exception
                                                                                    • API String ID: 3476068407-410509341
                                                                                    • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                    • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                    • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                    • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                    APIs
                                                                                    • waveInPrepareHeader.WINMM(00B45638,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                                                                    • waveInAddBuffer.WINMM(00B45638,00000020,?,00000000,00401A15), ref: 0040185F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: wave$BufferHeaderPrepare
                                                                                    • String ID: XMG
                                                                                    • API String ID: 2315374483-813777761
                                                                                    • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                    • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                                    • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                    • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                                    APIs
                                                                                    • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: LocaleValid
                                                                                    • String ID: IsValidLocaleName$kKD
                                                                                    • API String ID: 1901932003-3269126172
                                                                                    • Opcode ID: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                                                                    • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                                                                    • Opcode Fuzzy Hash: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                                                                    • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                                                                    APIs
                                                                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExistsFilePath
                                                                                    • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                                    • API String ID: 1174141254-4188645398
                                                                                    • Opcode ID: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                                                                                    • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                                                                    • Opcode Fuzzy Hash: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                                                                                    • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                                                                    APIs
                                                                                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExistsFilePath
                                                                                    • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                                    • API String ID: 1174141254-2800177040
                                                                                    • Opcode ID: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                                                                                    • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                                                                    • Opcode Fuzzy Hash: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                                                                                    • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                                                                    APIs
                                                                                    • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExistsFilePath
                                                                                    • String ID: AppData$\Opera Software\Opera Stable\
                                                                                    • API String ID: 1174141254-1629609700
                                                                                    • Opcode ID: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                                                                                    • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                                                                    • Opcode Fuzzy Hash: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                                                                                    • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                                                                    APIs
                                                                                    • GetKeyState.USER32(00000011), ref: 0040B686
                                                                                      • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                                                                      • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                                                      • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                                                      • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                                                                      • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                                                                      • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                                                      • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                                                      • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                    • String ID: [AltL]$[AltR]
                                                                                    • API String ID: 2738857842-2658077756
                                                                                    • Opcode ID: f508c8d0c28e71ac455fa2a77041b079ca691cd00d60daeee8bf3b3b3c4de222
                                                                                    • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                                                                    • Opcode Fuzzy Hash: f508c8d0c28e71ac455fa2a77041b079ca691cd00d60daeee8bf3b3b3c4de222
                                                                                    • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                                                                    APIs
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExecuteShell
                                                                                    • String ID: !D@$open
                                                                                    • API String ID: 587946157-1586967515
                                                                                    • Opcode ID: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                                                                                    • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                                                                    • Opcode Fuzzy Hash: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                                                                                    • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                                                                    APIs
                                                                                    • GetKeyState.USER32(00000012), ref: 0040B6E0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: State
                                                                                    • String ID: [CtrlL]$[CtrlR]
                                                                                    • API String ID: 1649606143-2446555240
                                                                                    • Opcode ID: 1ad9dfb3c513a634c020206c6c5afe09b5350a38294d89605c778c55c0391829
                                                                                    • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                                                                    • Opcode Fuzzy Hash: 1ad9dfb3c513a634c020206c6c5afe09b5350a38294d89605c778c55c0391829
                                                                                    • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                                                                    APIs
                                                                                      • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                    • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Init_thread_footer__onexit
                                                                                    • String ID: ,kG$0kG
                                                                                    • API String ID: 1881088180-2015055088
                                                                                    • Opcode ID: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                                    • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                                                                    • Opcode Fuzzy Hash: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                                    • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                                                                    APIs
                                                                                    • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D17F,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A6C
                                                                                    • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A80
                                                                                    Strings
                                                                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DeleteOpenValue
                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                    • API String ID: 2654517830-1051519024
                                                                                    • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                    • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                                                                    • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                    • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                                                                    APIs
                                                                                    • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                                                                                    • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DeleteDirectoryFileRemove
                                                                                    • String ID: pth_unenc
                                                                                    • API String ID: 3325800564-4028850238
                                                                                    • Opcode ID: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                                    • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                                                                    • Opcode Fuzzy Hash: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                                    • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                                                                    APIs
                                                                                    • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                    • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ObjectProcessSingleTerminateWait
                                                                                    • String ID: pth_unenc
                                                                                    • API String ID: 1872346434-4028850238
                                                                                    • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                                    • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                                                                                    • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                                    • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CountInfoInputLastTick
                                                                                    • String ID: NG
                                                                                    • API String ID: 3478931382-1651712548
                                                                                    • Opcode ID: 1072e3c2261f103fc32e137a75d3669dd2f4511b29ca1c5cc6daf9e0edaf2e7e
                                                                                    • Instruction ID: 91b37e9d9b7f8f393223e5bf0be67cbbeb1ccf95644ad96dbec1e326022f3834
                                                                                    • Opcode Fuzzy Hash: 1072e3c2261f103fc32e137a75d3669dd2f4511b29ca1c5cc6daf9e0edaf2e7e
                                                                                    • Instruction Fuzzy Hash: 84D0C97180060CABDB04AFA5EC4D99DBBBCEB05212F1042A5E84992210DA71AA548A95
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                                                                    • GetLastError.KERNEL32 ref: 00440D85
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1717984340-0
                                                                                    • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                                    • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                                                                    • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                                    • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                                                                    APIs
                                                                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                                                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                                                                    • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                                                                                    • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4115678995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    • Associated: 00000002.00000002.4115678995.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_400000_MSBuild.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLastRead
                                                                                    • String ID:
                                                                                    • API String ID: 4100373531-0
                                                                                    • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                                    • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                                                                    • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                                    • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                                                                                    Execution Graph

                                                                                    Execution Coverage:6.5%
                                                                                    Dynamic/Decrypted Code Coverage:9.2%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:2000
                                                                                    Total number of Limit Nodes:77
                                                                                    execution_graph 40227 441819 40230 430737 40227->40230 40229 441825 40231 430756 40230->40231 40232 43076d 40230->40232 40233 430774 40231->40233 40234 43075f 40231->40234 40232->40229 40245 43034a memcpy 40233->40245 40244 4169a7 11 API calls 40234->40244 40237 4307ce 40238 430819 memset 40237->40238 40246 415b2c 11 API calls 40237->40246 40238->40232 40239 43077e 40239->40232 40239->40237 40242 4307fa 40239->40242 40241 4307e9 40241->40232 40241->40238 40247 4169a7 11 API calls 40242->40247 40244->40232 40245->40239 40246->40241 40247->40232 37540 442ec6 19 API calls 37717 4152c6 malloc 37718 4152e2 37717->37718 37719 4152ef 37717->37719 37721 416760 11 API calls 37719->37721 37721->37718 37722 4466f4 37741 446904 37722->37741 37724 446700 GetModuleHandleA 37727 446710 __set_app_type __p__fmode __p__commode 37724->37727 37726 4467a4 37728 4467ac __setusermatherr 37726->37728 37729 4467b8 37726->37729 37727->37726 37728->37729 37742 4468f0 _controlfp 37729->37742 37731 4467bd _initterm __wgetmainargs _initterm 37732 446810 37731->37732 37733 44681e GetStartupInfoW 37731->37733 37735 446866 GetModuleHandleA 37733->37735 37743 41276d 37735->37743 37739 446896 exit 37740 44689d _cexit 37739->37740 37740->37732 37741->37724 37742->37731 37744 41277d 37743->37744 37786 4044a4 LoadLibraryW 37744->37786 37746 412785 37747 412789 37746->37747 37794 414b81 37746->37794 37747->37739 37747->37740 37750 4127c8 37800 412465 memset ??2@YAPAXI 37750->37800 37752 4127ea 37812 40ac21 37752->37812 37757 412813 37830 40dd07 memset 37757->37830 37758 412827 37835 40db69 memset 37758->37835 37761 412822 37856 4125b6 ??3@YAXPAX 37761->37856 37763 40ada2 _wcsicmp 37764 41283d 37763->37764 37764->37761 37767 412863 CoInitialize 37764->37767 37840 41268e 37764->37840 37860 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37767->37860 37769 41296f 37862 40b633 37769->37862 37774 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37778 412957 CoUninitialize 37774->37778 37783 4128ca 37774->37783 37778->37761 37779 4128d0 TranslateAcceleratorW 37780 412941 GetMessageW 37779->37780 37779->37783 37780->37778 37780->37779 37781 412909 IsDialogMessageW 37781->37780 37781->37783 37782 4128fd IsDialogMessageW 37782->37780 37782->37781 37783->37779 37783->37781 37783->37782 37784 41292b TranslateMessage DispatchMessageW 37783->37784 37785 41291f IsDialogMessageW 37783->37785 37784->37780 37785->37780 37785->37784 37787 4044f7 37786->37787 37788 4044cf GetProcAddress 37786->37788 37792 404507 MessageBoxW 37787->37792 37793 40451e 37787->37793 37789 4044e8 FreeLibrary 37788->37789 37790 4044df 37788->37790 37789->37787 37791 4044f3 37789->37791 37790->37789 37791->37787 37792->37746 37793->37746 37795 414b8a 37794->37795 37796 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37794->37796 37866 40a804 memset 37795->37866 37796->37750 37799 414b9e GetProcAddress 37799->37796 37801 4124e0 37800->37801 37802 412505 ??2@YAPAXI 37801->37802 37803 41251c 37802->37803 37805 412521 37802->37805 37888 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37803->37888 37877 444722 37805->37877 37811 41259b wcscpy 37811->37752 37893 40b1ab free free 37812->37893 37814 40ac5c 37817 40a9ce malloc memcpy free free 37814->37817 37818 40ad4b 37814->37818 37820 40ace7 free 37814->37820 37825 40ad76 37814->37825 37897 40a8d0 37814->37897 37909 4099f4 37814->37909 37817->37814 37818->37825 37917 40a9ce 37818->37917 37820->37814 37824 40a8d0 7 API calls 37824->37825 37894 40aa04 37825->37894 37826 40ada2 37828 40adc9 37826->37828 37829 40adaa 37826->37829 37827 40adb3 _wcsicmp 37827->37828 37827->37829 37828->37757 37828->37758 37829->37827 37829->37828 37922 40dce0 37830->37922 37832 40dd3a GetModuleHandleW 37927 40dba7 37832->37927 37836 40dce0 3 API calls 37835->37836 37837 40db99 37836->37837 37999 40dae1 37837->37999 38013 402f3a 37840->38013 37842 412766 37842->37761 37842->37767 37843 4126d3 _wcsicmp 37844 4126a8 37843->37844 37844->37842 37844->37843 37846 41270a 37844->37846 38047 4125f8 7 API calls 37844->38047 37846->37842 38016 411ac5 37846->38016 37857 4125da 37856->37857 37858 4125f0 37857->37858 37859 4125e6 DeleteObject 37857->37859 37861 40b1ab free free 37858->37861 37859->37858 37860->37774 37861->37769 37863 40b640 37862->37863 37864 40b639 free 37862->37864 37865 40b1ab free free 37863->37865 37864->37863 37865->37747 37867 40a83b GetSystemDirectoryW 37866->37867 37868 40a84c wcscpy 37866->37868 37867->37868 37873 409719 wcslen 37868->37873 37871 40a881 LoadLibraryW 37872 40a886 37871->37872 37872->37796 37872->37799 37874 409724 37873->37874 37875 409739 wcscat LoadLibraryW 37873->37875 37874->37875 37876 40972c wcscat 37874->37876 37875->37871 37875->37872 37876->37875 37878 444732 37877->37878 37879 444728 DeleteObject 37877->37879 37889 409cc3 37878->37889 37879->37878 37881 412551 37882 4010f9 37881->37882 37883 401130 37882->37883 37884 401134 GetModuleHandleW LoadIconW 37883->37884 37885 401107 wcsncat 37883->37885 37886 40a7be 37884->37886 37885->37883 37887 40a7d2 37886->37887 37887->37811 37887->37887 37888->37805 37892 409bfd memset wcscpy 37889->37892 37891 409cdb CreateFontIndirectW 37891->37881 37892->37891 37893->37814 37895 40aa14 37894->37895 37896 40aa0a free 37894->37896 37895->37826 37896->37895 37898 40a8eb 37897->37898 37899 40a8df wcslen 37897->37899 37900 40a906 free 37898->37900 37901 40a90f 37898->37901 37899->37898 37902 40a919 37900->37902 37903 4099f4 3 API calls 37901->37903 37904 40a932 37902->37904 37905 40a929 free 37902->37905 37903->37902 37906 4099f4 3 API calls 37904->37906 37907 40a93e memcpy 37905->37907 37908 40a93d 37906->37908 37907->37814 37908->37907 37910 409a41 37909->37910 37911 4099fb malloc 37909->37911 37910->37814 37913 409a37 37911->37913 37914 409a1c 37911->37914 37913->37814 37915 409a30 free 37914->37915 37916 409a20 memcpy 37914->37916 37915->37913 37916->37915 37918 40a9e7 37917->37918 37919 40a9dc free 37917->37919 37921 4099f4 3 API calls 37918->37921 37920 40a9f2 37919->37920 37920->37824 37921->37920 37946 409bca GetModuleFileNameW 37922->37946 37924 40dce6 wcsrchr 37925 40dcf5 37924->37925 37926 40dcf9 wcscat 37924->37926 37925->37926 37926->37832 37947 44db70 37927->37947 37931 40dbfd 37950 4447d9 37931->37950 37934 40dc34 wcscpy wcscpy 37976 40d6f5 37934->37976 37935 40dc1f wcscpy 37935->37934 37938 40d6f5 3 API calls 37939 40dc73 37938->37939 37940 40d6f5 3 API calls 37939->37940 37941 40dc89 37940->37941 37942 40d6f5 3 API calls 37941->37942 37943 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 37942->37943 37982 40da80 37943->37982 37946->37924 37948 40dbb4 memset memset 37947->37948 37949 409bca GetModuleFileNameW 37948->37949 37949->37931 37952 4447f4 37950->37952 37951 40dc1b 37951->37934 37951->37935 37952->37951 37953 444807 ??2@YAPAXI 37952->37953 37954 44481f 37953->37954 37955 444873 _snwprintf 37954->37955 37956 4448ab wcscpy 37954->37956 37989 44474a 8 API calls 37955->37989 37958 4448bb 37956->37958 37990 44474a 8 API calls 37958->37990 37960 4448a7 37960->37956 37960->37958 37961 4448cd 37991 44474a 8 API calls 37961->37991 37963 4448e2 37992 44474a 8 API calls 37963->37992 37965 4448f7 37993 44474a 8 API calls 37965->37993 37967 44490c 37994 44474a 8 API calls 37967->37994 37969 444921 37995 44474a 8 API calls 37969->37995 37971 444936 37996 44474a 8 API calls 37971->37996 37973 44494b 37997 44474a 8 API calls 37973->37997 37975 444960 ??3@YAXPAX 37975->37951 37977 44db70 37976->37977 37978 40d702 memset GetPrivateProfileStringW 37977->37978 37979 40d752 37978->37979 37980 40d75c WritePrivateProfileStringW 37978->37980 37979->37980 37981 40d758 37979->37981 37980->37981 37981->37938 37983 44db70 37982->37983 37984 40da8d memset 37983->37984 37985 40daac LoadStringW 37984->37985 37986 40dac6 37985->37986 37986->37985 37988 40dade 37986->37988 37998 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 37986->37998 37988->37761 37989->37960 37990->37961 37991->37963 37992->37965 37993->37967 37994->37969 37995->37971 37996->37973 37997->37975 37998->37986 38009 409b98 GetFileAttributesW 37999->38009 38001 40daea 38002 40db63 38001->38002 38003 40daef wcscpy wcscpy GetPrivateProfileIntW 38001->38003 38002->37763 38010 40d65d GetPrivateProfileStringW 38003->38010 38005 40db3e 38011 40d65d GetPrivateProfileStringW 38005->38011 38007 40db4f 38012 40d65d GetPrivateProfileStringW 38007->38012 38009->38001 38010->38005 38011->38007 38012->38002 38048 40eaff 38013->38048 38017 411ae2 memset 38016->38017 38018 411b8f 38016->38018 38088 409bca GetModuleFileNameW 38017->38088 38030 411a8b 38018->38030 38020 411b0a wcsrchr 38021 411b22 wcscat 38020->38021 38022 411b1f 38020->38022 38089 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38021->38089 38022->38021 38024 411b67 38090 402afb 38024->38090 38028 411b7f 38146 40ea13 SendMessageW memset SendMessageW 38028->38146 38031 402afb 27 API calls 38030->38031 38032 411ac0 38031->38032 38033 4110dc 38032->38033 38034 41113e 38033->38034 38039 4110f0 38033->38039 38171 40969c LoadCursorW SetCursor 38034->38171 38036 411143 38172 4032b4 38036->38172 38190 444a54 38036->38190 38037 4110f7 _wcsicmp 38037->38039 38038 411157 38040 40ada2 _wcsicmp 38038->38040 38039->38034 38039->38037 38193 410c46 10 API calls 38039->38193 38043 411167 38040->38043 38041 4111af 38043->38041 38044 4111a6 qsort 38043->38044 38044->38041 38047->37844 38049 40eb10 38048->38049 38061 40e8e0 38049->38061 38052 40eb6c memcpy memcpy 38056 40ebb7 38052->38056 38053 40ebf2 ??2@YAPAXI ??2@YAPAXI 38055 40ec2e ??2@YAPAXI 38053->38055 38058 40ec65 38053->38058 38054 40d134 16 API calls 38054->38056 38055->38058 38056->38052 38056->38053 38056->38054 38058->38058 38071 40ea7f 38058->38071 38060 402f49 38060->37844 38062 40e8f2 38061->38062 38063 40e8eb ??3@YAXPAX 38061->38063 38064 40e900 38062->38064 38065 40e8f9 ??3@YAXPAX 38062->38065 38063->38062 38066 40e911 38064->38066 38067 40e90a ??3@YAXPAX 38064->38067 38065->38064 38068 40e931 ??2@YAPAXI ??2@YAPAXI 38066->38068 38069 40e921 ??3@YAXPAX 38066->38069 38070 40e92a ??3@YAXPAX 38066->38070 38067->38066 38068->38052 38069->38070 38070->38068 38072 40aa04 free 38071->38072 38073 40ea88 38072->38073 38074 40aa04 free 38073->38074 38075 40ea90 38074->38075 38076 40aa04 free 38075->38076 38077 40ea98 38076->38077 38078 40aa04 free 38077->38078 38079 40eaa0 38078->38079 38080 40a9ce 4 API calls 38079->38080 38081 40eab3 38080->38081 38082 40a9ce 4 API calls 38081->38082 38083 40eabd 38082->38083 38084 40a9ce 4 API calls 38083->38084 38085 40eac7 38084->38085 38086 40a9ce 4 API calls 38085->38086 38087 40ead1 38086->38087 38087->38060 38088->38020 38089->38024 38147 40b2cc 38090->38147 38092 402b0a 38093 40b2cc 27 API calls 38092->38093 38094 402b23 38093->38094 38095 40b2cc 27 API calls 38094->38095 38096 402b3a 38095->38096 38097 40b2cc 27 API calls 38096->38097 38098 402b54 38097->38098 38099 40b2cc 27 API calls 38098->38099 38100 402b6b 38099->38100 38101 40b2cc 27 API calls 38100->38101 38102 402b82 38101->38102 38103 40b2cc 27 API calls 38102->38103 38104 402b99 38103->38104 38105 40b2cc 27 API calls 38104->38105 38106 402bb0 38105->38106 38107 40b2cc 27 API calls 38106->38107 38108 402bc7 38107->38108 38109 40b2cc 27 API calls 38108->38109 38110 402bde 38109->38110 38111 40b2cc 27 API calls 38110->38111 38112 402bf5 38111->38112 38113 40b2cc 27 API calls 38112->38113 38114 402c0c 38113->38114 38115 40b2cc 27 API calls 38114->38115 38116 402c23 38115->38116 38117 40b2cc 27 API calls 38116->38117 38118 402c3a 38117->38118 38119 40b2cc 27 API calls 38118->38119 38120 402c51 38119->38120 38121 40b2cc 27 API calls 38120->38121 38122 402c68 38121->38122 38123 40b2cc 27 API calls 38122->38123 38124 402c7f 38123->38124 38125 40b2cc 27 API calls 38124->38125 38126 402c99 38125->38126 38127 40b2cc 27 API calls 38126->38127 38128 402cb3 38127->38128 38129 40b2cc 27 API calls 38128->38129 38130 402cd5 38129->38130 38131 40b2cc 27 API calls 38130->38131 38132 402cf0 38131->38132 38133 40b2cc 27 API calls 38132->38133 38134 402d0b 38133->38134 38135 40b2cc 27 API calls 38134->38135 38136 402d26 38135->38136 38137 40b2cc 27 API calls 38136->38137 38138 402d3e 38137->38138 38139 40b2cc 27 API calls 38138->38139 38140 402d59 38139->38140 38141 40b2cc 27 API calls 38140->38141 38142 402d78 38141->38142 38143 40b2cc 27 API calls 38142->38143 38144 402d93 38143->38144 38145 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38144->38145 38145->38028 38146->38018 38150 40b58d 38147->38150 38149 40b2d1 38149->38092 38151 40b5a4 GetModuleHandleW FindResourceW 38150->38151 38152 40b62e 38150->38152 38153 40b5c2 LoadResource 38151->38153 38155 40b5e7 38151->38155 38152->38149 38154 40b5d0 SizeofResource LockResource 38153->38154 38153->38155 38154->38155 38155->38152 38163 40afcf 38155->38163 38157 40b608 memcpy 38166 40b4d3 memcpy 38157->38166 38159 40b61e 38167 40b3c1 18 API calls 38159->38167 38161 40b626 38168 40b04b 38161->38168 38164 40b04b ??3@YAXPAX 38163->38164 38165 40afd7 ??2@YAPAXI 38164->38165 38165->38157 38166->38159 38167->38161 38169 40b051 ??3@YAXPAX 38168->38169 38170 40b05f 38168->38170 38169->38170 38170->38152 38171->38036 38173 4032c4 38172->38173 38174 40b633 free 38173->38174 38175 403316 38174->38175 38194 44553b 38175->38194 38179 403480 38392 40368c 15 API calls 38179->38392 38181 403489 38182 40b633 free 38181->38182 38183 403495 38182->38183 38183->38038 38184 4033a9 memset memcpy 38185 4033ec wcscmp 38184->38185 38186 40333c 38184->38186 38185->38186 38186->38179 38186->38184 38186->38185 38390 4028e7 11 API calls 38186->38390 38391 40f508 6 API calls 38186->38391 38188 403421 _wcsicmp 38188->38186 38191 444a64 FreeLibrary 38190->38191 38192 444a83 38190->38192 38191->38192 38192->38038 38193->38039 38195 445548 38194->38195 38196 445599 38195->38196 38393 40c768 38195->38393 38197 4455a8 memset 38196->38197 38340 4457f2 38196->38340 38476 403988 38197->38476 38204 445854 38205 4458aa 38204->38205 38601 403c9c memset memset memset memset memset 38204->38601 38207 44594a 38205->38207 38208 4458bb memset memset 38205->38208 38206 445672 38487 403fbe memset memset memset memset memset 38206->38487 38210 4459ed 38207->38210 38211 44595e memset memset 38207->38211 38213 414c2e 16 API calls 38208->38213 38216 445a00 memset memset 38210->38216 38217 445b22 38210->38217 38218 414c2e 16 API calls 38211->38218 38212 4455e5 38212->38206 38230 44560f 38212->38230 38219 4458f9 38213->38219 38214 44557a 38220 44558c 38214->38220 38673 4136c0 CoTaskMemFree 38214->38673 38624 414c2e 38216->38624 38222 445bca 38217->38222 38223 445b38 memset memset memset 38217->38223 38228 44599c 38218->38228 38229 40b2cc 27 API calls 38219->38229 38460 444b06 38220->38460 38240 445c8b memset memset 38222->38240 38290 445cf0 38222->38290 38235 445bd4 38223->38235 38236 445b98 38223->38236 38224 445849 38689 40b1ab free free 38224->38689 38239 40b2cc 27 API calls 38228->38239 38241 445909 38229->38241 38232 4087b3 338 API calls 38230->38232 38251 445621 38232->38251 38233 445585 38674 41366b FreeLibrary 38233->38674 38234 44589f 38690 40b1ab free free 38234->38690 38248 414c2e 16 API calls 38235->38248 38236->38235 38244 445ba2 38236->38244 38253 4459ac 38239->38253 38242 414c2e 16 API calls 38240->38242 38250 409d1f 6 API calls 38241->38250 38254 445cc9 38242->38254 38762 4099c6 wcslen 38244->38762 38245 4456b2 38677 40b1ab free free 38245->38677 38247 40b2cc 27 API calls 38257 445a4f 38247->38257 38259 445be2 38248->38259 38249 403335 38389 4452e5 45 API calls 38249->38389 38262 445919 38250->38262 38675 4454bf 20 API calls 38251->38675 38252 445823 38252->38224 38270 4087b3 338 API calls 38252->38270 38263 409d1f 6 API calls 38253->38263 38264 409d1f 6 API calls 38254->38264 38255 445879 38255->38234 38274 4087b3 338 API calls 38255->38274 38639 409d1f wcslen wcslen 38257->38639 38268 40b2cc 27 API calls 38259->38268 38260 445d3d 38288 40b2cc 27 API calls 38260->38288 38261 445d88 memset memset memset 38271 414c2e 16 API calls 38261->38271 38691 409b98 GetFileAttributesW 38262->38691 38272 4459bc 38263->38272 38273 445ce1 38264->38273 38265 445bb3 38765 445403 memset 38265->38765 38266 445680 38266->38245 38510 4087b3 memset 38266->38510 38277 445bf3 38268->38277 38270->38252 38280 445dde 38271->38280 38758 409b98 GetFileAttributesW 38272->38758 38782 409b98 GetFileAttributesW 38273->38782 38274->38255 38287 409d1f 6 API calls 38277->38287 38278 445928 38278->38207 38692 40b6ef 38278->38692 38289 40b2cc 27 API calls 38280->38289 38282 4459cb 38282->38210 38299 40b6ef 252 API calls 38282->38299 38286 40b2cc 27 API calls 38292 445a94 38286->38292 38294 445c07 38287->38294 38295 445d54 _wcsicmp 38288->38295 38298 445def 38289->38298 38290->38249 38290->38260 38290->38261 38291 445389 258 API calls 38291->38222 38644 40ae18 38292->38644 38293 44566d 38293->38340 38561 413d4c 38293->38561 38302 445389 258 API calls 38294->38302 38303 445d71 38295->38303 38366 445d67 38295->38366 38297 445665 38676 40b1ab free free 38297->38676 38304 409d1f 6 API calls 38298->38304 38299->38210 38307 445c17 38302->38307 38783 445093 23 API calls 38303->38783 38310 445e03 38304->38310 38306 4456d8 38312 40b2cc 27 API calls 38306->38312 38313 40b2cc 27 API calls 38307->38313 38309 44563c 38309->38297 38315 4087b3 338 API calls 38309->38315 38784 409b98 GetFileAttributesW 38310->38784 38311 40b6ef 252 API calls 38311->38249 38317 4456e2 38312->38317 38318 445c23 38313->38318 38314 445d83 38314->38249 38315->38309 38678 413fa6 _wcsicmp _wcsicmp 38317->38678 38322 409d1f 6 API calls 38318->38322 38320 445e12 38323 445e6b 38320->38323 38327 40b2cc 27 API calls 38320->38327 38325 445c37 38322->38325 38786 445093 23 API calls 38323->38786 38324 4456eb 38330 4456fd memset memset memset memset 38324->38330 38331 4457ea 38324->38331 38332 445389 258 API calls 38325->38332 38326 445b17 38759 40aebe 38326->38759 38334 445e33 38327->38334 38679 409c70 wcscpy wcsrchr 38330->38679 38682 413d29 38331->38682 38338 445c47 38332->38338 38339 409d1f 6 API calls 38334->38339 38336 445e7e 38341 445f67 38336->38341 38344 40b2cc 27 API calls 38338->38344 38345 445e47 38339->38345 38340->38204 38578 403e2d memset memset memset memset memset 38340->38578 38346 40b2cc 27 API calls 38341->38346 38342 445ab2 memset 38347 40b2cc 27 API calls 38342->38347 38349 445c53 38344->38349 38785 409b98 GetFileAttributesW 38345->38785 38351 445f73 38346->38351 38352 445aa1 38347->38352 38348 409c70 2 API calls 38353 44577e 38348->38353 38354 409d1f 6 API calls 38349->38354 38356 409d1f 6 API calls 38351->38356 38352->38326 38352->38342 38357 409d1f 6 API calls 38352->38357 38651 40add4 38352->38651 38656 445389 38352->38656 38665 40ae51 38352->38665 38358 409c70 2 API calls 38353->38358 38359 445c67 38354->38359 38355 445e56 38355->38323 38363 445e83 memset 38355->38363 38360 445f87 38356->38360 38357->38352 38361 44578d 38358->38361 38362 445389 258 API calls 38359->38362 38789 409b98 GetFileAttributesW 38360->38789 38361->38331 38368 40b2cc 27 API calls 38361->38368 38362->38222 38367 40b2cc 27 API calls 38363->38367 38366->38249 38366->38311 38369 445eab 38367->38369 38370 4457a8 38368->38370 38371 409d1f 6 API calls 38369->38371 38372 409d1f 6 API calls 38370->38372 38374 445ebf 38371->38374 38373 4457b8 38372->38373 38681 409b98 GetFileAttributesW 38373->38681 38376 40ae18 9 API calls 38374->38376 38380 445ef5 38376->38380 38377 4457c7 38377->38331 38379 4087b3 338 API calls 38377->38379 38378 40ae51 9 API calls 38378->38380 38379->38331 38380->38378 38381 445f5c 38380->38381 38383 40add4 2 API calls 38380->38383 38384 40b2cc 27 API calls 38380->38384 38385 409d1f 6 API calls 38380->38385 38387 445f3a 38380->38387 38787 409b98 GetFileAttributesW 38380->38787 38382 40aebe FindClose 38381->38382 38382->38341 38383->38380 38384->38380 38385->38380 38788 445093 23 API calls 38387->38788 38389->38186 38390->38188 38391->38186 38392->38181 38394 40c775 38393->38394 38790 40b1ab free free 38394->38790 38396 40c788 38791 40b1ab free free 38396->38791 38398 40c790 38792 40b1ab free free 38398->38792 38400 40c798 38401 40aa04 free 38400->38401 38402 40c7a0 38401->38402 38793 40c274 memset 38402->38793 38407 40a8ab 9 API calls 38408 40c7c3 38407->38408 38409 40a8ab 9 API calls 38408->38409 38410 40c7d0 38409->38410 38822 40c3c3 38410->38822 38414 40c877 38423 40bdb0 38414->38423 38415 40c86c 38864 4053fe 39 API calls 38415->38864 38421 40c7e5 38421->38414 38421->38415 38422 40c634 49 API calls 38421->38422 38847 40a706 38421->38847 38422->38421 39054 404363 38423->39054 38426 40bf5d 39074 40440c 38426->39074 38428 40bdee 38428->38426 38431 40b2cc 27 API calls 38428->38431 38429 40bddf CredEnumerateW 38429->38428 38432 40be02 wcslen 38431->38432 38432->38426 38442 40be1e 38432->38442 38433 40be26 wcsncmp 38433->38442 38436 40be7d memset 38437 40bea7 memcpy 38436->38437 38436->38442 38438 40bf11 wcschr 38437->38438 38437->38442 38438->38442 38439 40b2cc 27 API calls 38440 40bef6 _wcsnicmp 38439->38440 38440->38438 38440->38442 38441 40bf43 LocalFree 38441->38442 38442->38426 38442->38433 38442->38436 38442->38437 38442->38438 38442->38439 38442->38441 39077 40bd5d 28 API calls 38442->39077 39078 404423 38442->39078 38443 4135f7 39091 4135e0 38443->39091 38446 40b2cc 27 API calls 38447 41360d 38446->38447 38448 40a804 8 API calls 38447->38448 38449 413613 38448->38449 38450 41361b 38449->38450 38451 41363e 38449->38451 38452 40b273 27 API calls 38450->38452 38453 4135e0 FreeLibrary 38451->38453 38454 413625 GetProcAddress 38452->38454 38455 413643 38453->38455 38454->38451 38456 413648 38454->38456 38455->38214 38457 413658 38456->38457 38458 4135e0 FreeLibrary 38456->38458 38457->38214 38459 413666 38458->38459 38459->38214 39094 4449b9 38460->39094 38463 4449b9 42 API calls 38465 444b4b 38463->38465 38464 444c15 38466 4449b9 42 API calls 38464->38466 38465->38464 39115 444972 GetVersionExW 38465->39115 38468 444c1f 38466->38468 38468->38196 38469 444b99 memcmp 38474 444b8c 38469->38474 38470 444c0b 39119 444a85 42 API calls 38470->39119 38474->38469 38474->38470 39116 444aa5 42 API calls 38474->39116 39117 40a7a0 GetVersionExW 38474->39117 39118 444a85 42 API calls 38474->39118 38477 40399d 38476->38477 39120 403a16 38477->39120 38480 403a12 wcsrchr 38480->38212 38483 4039a3 38484 4039f4 38483->38484 38486 403a09 38483->38486 39131 40a02c CreateFileW 38483->39131 38485 4099c6 2 API calls 38484->38485 38484->38486 38485->38486 39134 40b1ab free free 38486->39134 38488 414c2e 16 API calls 38487->38488 38489 404048 38488->38489 38490 414c2e 16 API calls 38489->38490 38491 404056 38490->38491 38492 409d1f 6 API calls 38491->38492 38493 404073 38492->38493 38494 409d1f 6 API calls 38493->38494 38495 40408e 38494->38495 38496 409d1f 6 API calls 38495->38496 38497 4040a6 38496->38497 38498 403af5 20 API calls 38497->38498 38499 4040ba 38498->38499 38500 403af5 20 API calls 38499->38500 38501 4040cb 38500->38501 39161 40414f memset 38501->39161 38503 404140 39175 40b1ab free free 38503->39175 38504 4040ec memset 38508 4040e0 38504->38508 38506 404148 38506->38266 38507 4099c6 2 API calls 38507->38508 38508->38503 38508->38504 38508->38507 38509 40a8ab 9 API calls 38508->38509 38509->38508 39188 40a6e6 WideCharToMultiByte 38510->39188 38512 4087ed 39189 4095d9 memset 38512->39189 38515 408809 memset memset memset memset memset 38516 40b2cc 27 API calls 38515->38516 38517 4088a1 38516->38517 38518 409d1f 6 API calls 38517->38518 38519 4088b1 38518->38519 38520 40b2cc 27 API calls 38519->38520 38521 4088c0 38520->38521 38522 409d1f 6 API calls 38521->38522 38523 4088d0 38522->38523 38524 40b2cc 27 API calls 38523->38524 38525 4088df 38524->38525 38526 409d1f 6 API calls 38525->38526 38527 4088ef 38526->38527 38528 40b2cc 27 API calls 38527->38528 38529 4088fe 38528->38529 38530 409d1f 6 API calls 38529->38530 38531 40890e 38530->38531 38532 40b2cc 27 API calls 38531->38532 38533 40891d 38532->38533 38534 409d1f 6 API calls 38533->38534 38535 40892d 38534->38535 39208 409b98 GetFileAttributesW 38535->39208 38537 40893e 38538 408943 38537->38538 38539 408958 38537->38539 39209 407fdf 75 API calls 38538->39209 39210 409b98 GetFileAttributesW 38539->39210 38542 408964 38547 408953 38547->38266 38562 40b633 free 38561->38562 38563 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38562->38563 38564 413f00 Process32NextW 38563->38564 38565 413da5 OpenProcess 38564->38565 38566 413f17 CloseHandle 38564->38566 38567 413eb0 38565->38567 38568 413df3 memset 38565->38568 38566->38306 38567->38564 38570 413ebf free 38567->38570 38571 4099f4 3 API calls 38567->38571 39510 413f27 38568->39510 38570->38567 38571->38567 38573 413e37 GetModuleHandleW 38574 413e1f 38573->38574 38575 413e46 GetProcAddress 38573->38575 38574->38573 39515 413959 38574->39515 39531 413ca4 38574->39531 38575->38574 38577 413ea2 CloseHandle 38577->38567 38579 414c2e 16 API calls 38578->38579 38580 403eb7 38579->38580 38581 414c2e 16 API calls 38580->38581 38582 403ec5 38581->38582 38583 409d1f 6 API calls 38582->38583 38584 403ee2 38583->38584 38585 409d1f 6 API calls 38584->38585 38586 403efd 38585->38586 38587 409d1f 6 API calls 38586->38587 38588 403f15 38587->38588 38589 403af5 20 API calls 38588->38589 38590 403f29 38589->38590 38591 403af5 20 API calls 38590->38591 38592 403f3a 38591->38592 38593 40414f 33 API calls 38592->38593 38599 403f4f 38593->38599 38594 403faf 39545 40b1ab free free 38594->39545 38596 403f5b memset 38596->38599 38597 403fb7 38597->38252 38598 4099c6 2 API calls 38598->38599 38599->38594 38599->38596 38599->38598 38600 40a8ab 9 API calls 38599->38600 38600->38599 38602 414c2e 16 API calls 38601->38602 38603 403d26 38602->38603 38604 414c2e 16 API calls 38603->38604 38605 403d34 38604->38605 38606 409d1f 6 API calls 38605->38606 38607 403d51 38606->38607 38608 409d1f 6 API calls 38607->38608 38609 403d6c 38608->38609 38610 409d1f 6 API calls 38609->38610 38611 403d84 38610->38611 38612 403af5 20 API calls 38611->38612 38613 403d98 38612->38613 38614 403af5 20 API calls 38613->38614 38615 403da9 38614->38615 38616 40414f 33 API calls 38615->38616 38622 403dbe 38616->38622 38617 403e1e 39546 40b1ab free free 38617->39546 38618 403dca memset 38618->38622 38620 403e26 38620->38255 38621 4099c6 2 API calls 38621->38622 38622->38617 38622->38618 38622->38621 38623 40a8ab 9 API calls 38622->38623 38623->38622 38625 414b81 9 API calls 38624->38625 38626 414c40 38625->38626 38627 414c73 memset 38626->38627 39547 409cea 38626->39547 38631 414c94 38627->38631 38630 414c64 38630->38247 39550 414592 RegOpenKeyExW 38631->39550 38633 414cc1 38634 414cf4 wcscpy 38633->38634 39551 414bb0 wcscpy 38633->39551 38634->38630 38636 414cd2 39552 4145ac RegQueryValueExW 38636->39552 38638 414ce9 RegCloseKey 38638->38634 38640 409d43 wcscpy 38639->38640 38642 409d62 38639->38642 38641 409719 2 API calls 38640->38641 38643 409d51 wcscat 38641->38643 38642->38286 38643->38642 38645 40aebe FindClose 38644->38645 38646 40ae21 38645->38646 38647 4099c6 2 API calls 38646->38647 38648 40ae35 38647->38648 38649 409d1f 6 API calls 38648->38649 38650 40ae49 38649->38650 38650->38352 38652 40ade0 38651->38652 38653 40ae0f 38651->38653 38652->38653 38654 40ade7 wcscmp 38652->38654 38653->38352 38654->38653 38655 40adfe wcscmp 38654->38655 38655->38653 38657 40ae18 9 API calls 38656->38657 38663 4453c4 38657->38663 38658 40ae51 9 API calls 38658->38663 38659 4453f3 38660 40aebe FindClose 38659->38660 38662 4453fe 38660->38662 38661 40add4 2 API calls 38661->38663 38662->38352 38663->38658 38663->38659 38663->38661 38664 445403 253 API calls 38663->38664 38664->38663 38666 40ae7b FindNextFileW 38665->38666 38667 40ae5c FindFirstFileW 38665->38667 38668 40ae8f 38666->38668 38669 40ae94 38666->38669 38667->38669 38670 40aebe FindClose 38668->38670 38671 40aeb6 38669->38671 38672 409d1f 6 API calls 38669->38672 38670->38669 38671->38352 38672->38671 38673->38233 38674->38220 38675->38309 38676->38293 38677->38293 38678->38324 38680 409c89 38679->38680 38680->38348 38681->38377 38683 413d39 38682->38683 38684 413d2f FreeLibrary 38682->38684 38685 40b633 free 38683->38685 38684->38683 38686 413d42 38685->38686 38687 40b633 free 38686->38687 38688 413d4a 38687->38688 38688->38340 38689->38204 38690->38205 38691->38278 38693 44db70 38692->38693 38694 40b6fc memset 38693->38694 38695 409c70 2 API calls 38694->38695 38696 40b732 wcsrchr 38695->38696 38697 40b743 38696->38697 38698 40b746 memset 38696->38698 38697->38698 38699 40b2cc 27 API calls 38698->38699 38700 40b76f 38699->38700 38701 409d1f 6 API calls 38700->38701 38702 40b783 38701->38702 39553 409b98 GetFileAttributesW 38702->39553 38704 40b792 38705 409c70 2 API calls 38704->38705 38719 40b7c2 38704->38719 38707 40b7a5 38705->38707 38709 40b2cc 27 API calls 38707->38709 38713 40b7b2 38709->38713 38710 40b837 CloseHandle 38712 40b83e memset 38710->38712 38711 40b817 39588 409a45 GetTempPathW 38711->39588 39587 40a6e6 WideCharToMultiByte 38712->39587 38717 409d1f 6 API calls 38713->38717 38715 40b827 CopyFileW 38715->38712 38717->38719 38718 40b866 38720 444432 121 API calls 38718->38720 39554 40bb98 38719->39554 38721 40b879 38720->38721 38722 40bad5 38721->38722 38723 40b273 27 API calls 38721->38723 38724 40baeb 38722->38724 38725 40bade DeleteFileW 38722->38725 38726 40b89a 38723->38726 38727 40b04b ??3@YAXPAX 38724->38727 38725->38724 38728 438552 134 API calls 38726->38728 38729 40baf3 38727->38729 38730 40b8a4 38728->38730 38729->38207 38731 40bacd 38730->38731 38733 4251c4 137 API calls 38730->38733 38732 443d90 111 API calls 38731->38732 38732->38722 38756 40b8b8 38733->38756 38734 40bac6 39600 424f26 123 API calls 38734->39600 38735 40b8bd memset 39591 425413 17 API calls 38735->39591 38738 425413 17 API calls 38738->38756 38741 40a71b MultiByteToWideChar 38741->38756 38742 40a734 MultiByteToWideChar 38742->38756 38745 40b9b5 memcmp 38745->38756 38746 4099c6 2 API calls 38746->38756 38747 404423 37 API calls 38747->38756 38750 40bb3e memset memcpy 39601 40a734 MultiByteToWideChar 38750->39601 38751 4251c4 137 API calls 38751->38756 38753 40bb88 LocalFree 38753->38756 38756->38734 38756->38735 38756->38738 38756->38741 38756->38742 38756->38745 38756->38746 38756->38747 38756->38750 38756->38751 38757 40ba5f memcmp 38756->38757 39592 4253ef 16 API calls 38756->39592 39593 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38756->39593 39594 4253af 17 API calls 38756->39594 39595 4253cf 17 API calls 38756->39595 39596 447280 memset 38756->39596 39597 447960 memset memcpy memcpy memcpy 38756->39597 39598 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38756->39598 39599 447920 memcpy memcpy memcpy 38756->39599 38757->38756 38758->38282 38760 40aed1 38759->38760 38761 40aec7 FindClose 38759->38761 38760->38217 38761->38760 38763 4099d7 38762->38763 38764 4099da memcpy 38762->38764 38763->38764 38764->38265 38766 40b2cc 27 API calls 38765->38766 38767 44543f 38766->38767 38768 409d1f 6 API calls 38767->38768 38769 44544f 38768->38769 39693 409b98 GetFileAttributesW 38769->39693 38771 445476 38774 40b2cc 27 API calls 38771->38774 38772 44545e 38772->38771 38773 40b6ef 252 API calls 38772->38773 38773->38771 38775 445482 38774->38775 38776 409d1f 6 API calls 38775->38776 38777 445492 38776->38777 39694 409b98 GetFileAttributesW 38777->39694 38779 4454a1 38780 4454b9 38779->38780 38781 40b6ef 252 API calls 38779->38781 38780->38291 38781->38780 38782->38290 38783->38314 38784->38320 38785->38355 38786->38336 38787->38380 38788->38380 38789->38366 38790->38396 38791->38398 38792->38400 38794 414c2e 16 API calls 38793->38794 38795 40c2ae 38794->38795 38865 40c1d3 38795->38865 38800 40c3be 38817 40a8ab 38800->38817 38801 40afcf 2 API calls 38802 40c2fd FindFirstUrlCacheEntryW 38801->38802 38803 40c3b6 38802->38803 38804 40c31e wcschr 38802->38804 38805 40b04b ??3@YAXPAX 38803->38805 38806 40c331 38804->38806 38807 40c35e FindNextUrlCacheEntryW 38804->38807 38805->38800 38808 40a8ab 9 API calls 38806->38808 38807->38804 38809 40c373 GetLastError 38807->38809 38812 40c33e wcschr 38808->38812 38810 40c3ad FindCloseUrlCache 38809->38810 38811 40c37e 38809->38811 38810->38803 38813 40afcf 2 API calls 38811->38813 38812->38807 38814 40c34f 38812->38814 38815 40c391 FindNextUrlCacheEntryW 38813->38815 38816 40a8ab 9 API calls 38814->38816 38815->38804 38815->38810 38816->38807 38981 40a97a 38817->38981 38820 40a8cc 38820->38407 38821 40a8d0 7 API calls 38821->38820 38986 40b1ab free free 38822->38986 38824 40c3dd 38825 40b2cc 27 API calls 38824->38825 38826 40c3e7 38825->38826 38987 414592 RegOpenKeyExW 38826->38987 38828 40c3f4 38829 40c50e 38828->38829 38830 40c3ff 38828->38830 38844 405337 38829->38844 38831 40a9ce 4 API calls 38830->38831 38832 40c418 memset 38831->38832 38988 40aa1d 38832->38988 38835 40c471 38837 40c47a _wcsupr 38835->38837 38836 40c505 RegCloseKey 38836->38829 38838 40a8d0 7 API calls 38837->38838 38839 40c498 38838->38839 38840 40a8d0 7 API calls 38839->38840 38841 40c4ac memset 38840->38841 38842 40aa1d 38841->38842 38843 40c4e4 RegEnumValueW 38842->38843 38843->38836 38843->38837 38990 405220 38844->38990 38848 4099c6 2 API calls 38847->38848 38849 40a714 _wcslwr 38848->38849 38850 40c634 38849->38850 39047 405361 38850->39047 38853 40c65c wcslen 39050 4053b6 39 API calls 38853->39050 38854 40c71d wcslen 38854->38421 38856 40c677 38857 40c713 38856->38857 39051 40538b 39 API calls 38856->39051 39053 4053df 39 API calls 38857->39053 38860 40c6a5 38860->38857 38861 40c6a9 memset 38860->38861 38862 40c6d3 38861->38862 39052 40c589 43 API calls 38862->39052 38864->38414 38866 40ae18 9 API calls 38865->38866 38872 40c210 38866->38872 38867 40ae51 9 API calls 38867->38872 38868 40c264 38869 40aebe FindClose 38868->38869 38871 40c26f 38869->38871 38870 40add4 2 API calls 38870->38872 38877 40e5ed memset memset 38871->38877 38872->38867 38872->38868 38872->38870 38873 40c231 _wcsicmp 38872->38873 38874 40c1d3 35 API calls 38872->38874 38873->38872 38875 40c248 38873->38875 38874->38872 38890 40c084 22 API calls 38875->38890 38878 414c2e 16 API calls 38877->38878 38879 40e63f 38878->38879 38880 409d1f 6 API calls 38879->38880 38881 40e658 38880->38881 38891 409b98 GetFileAttributesW 38881->38891 38883 40e667 38884 40e680 38883->38884 38885 409d1f 6 API calls 38883->38885 38892 409b98 GetFileAttributesW 38884->38892 38885->38884 38887 40e68f 38889 40c2d8 38887->38889 38893 40e4b2 38887->38893 38889->38800 38889->38801 38890->38872 38891->38883 38892->38887 38914 40e01e 38893->38914 38895 40e593 38896 40e5b0 38895->38896 38897 40e59c DeleteFileW 38895->38897 38899 40b04b ??3@YAXPAX 38896->38899 38897->38896 38898 40e521 38898->38895 38937 40e175 38898->38937 38900 40e5bb 38899->38900 38902 40e5c4 CloseHandle 38900->38902 38903 40e5cc 38900->38903 38902->38903 38905 40b633 free 38903->38905 38904 40e573 38907 40e584 38904->38907 38908 40e57c CloseHandle 38904->38908 38906 40e5db 38905->38906 38910 40b633 free 38906->38910 38980 40b1ab free free 38907->38980 38908->38907 38909 40e540 38909->38904 38957 40e2ab 38909->38957 38912 40e5e3 38910->38912 38912->38889 38915 406214 22 API calls 38914->38915 38916 40e03c 38915->38916 38917 40e16b 38916->38917 38918 40dd85 74 API calls 38916->38918 38917->38898 38919 40e06b 38918->38919 38919->38917 38920 40afcf ??2@YAPAXI ??3@YAXPAX 38919->38920 38921 40e08d OpenProcess 38920->38921 38922 40e0a4 GetCurrentProcess DuplicateHandle 38921->38922 38926 40e152 38921->38926 38923 40e0d0 GetFileSize 38922->38923 38924 40e14a CloseHandle 38922->38924 38927 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 38923->38927 38924->38926 38925 40e160 38929 40b04b ??3@YAXPAX 38925->38929 38926->38925 38928 406214 22 API calls 38926->38928 38930 40e0ea 38927->38930 38928->38925 38929->38917 38931 4096dc CreateFileW 38930->38931 38932 40e0f1 CreateFileMappingW 38931->38932 38933 40e140 CloseHandle CloseHandle 38932->38933 38934 40e10b MapViewOfFile 38932->38934 38933->38924 38935 40e13b CloseHandle 38934->38935 38936 40e11f WriteFile UnmapViewOfFile 38934->38936 38935->38933 38936->38935 38938 40e18c 38937->38938 38939 406b90 11 API calls 38938->38939 38940 40e19f 38939->38940 38941 40e1a7 memset 38940->38941 38942 40e299 38940->38942 38947 40e1e8 38941->38947 38943 4069a3 ??3@YAXPAX free 38942->38943 38944 40e2a4 38943->38944 38944->38909 38945 406e8f 13 API calls 38945->38947 38946 406b53 SetFilePointerEx ReadFile 38946->38947 38947->38945 38947->38946 38948 40e283 38947->38948 38949 40dd50 _wcsicmp 38947->38949 38953 40742e 8 API calls 38947->38953 38954 40aae3 wcslen wcslen _memicmp 38947->38954 38955 40e244 _snwprintf 38947->38955 38950 40e291 38948->38950 38951 40e288 free 38948->38951 38949->38947 38952 40aa04 free 38950->38952 38951->38950 38952->38942 38953->38947 38954->38947 38956 40a8d0 7 API calls 38955->38956 38956->38947 38958 40e2c2 38957->38958 38959 406b90 11 API calls 38958->38959 38979 40e2d3 38959->38979 38960 40e4a0 38961 4069a3 ??3@YAXPAX free 38960->38961 38963 40e4ab 38961->38963 38962 406e8f 13 API calls 38962->38979 38963->38909 38964 406b53 SetFilePointerEx ReadFile 38964->38979 38965 40e489 38966 40aa04 free 38965->38966 38967 40e491 38966->38967 38967->38960 38968 40e497 free 38967->38968 38968->38960 38969 40dd50 _wcsicmp 38969->38979 38970 40dd50 _wcsicmp 38971 40e376 memset 38970->38971 38972 40aa29 6 API calls 38971->38972 38972->38979 38973 40742e 8 API calls 38973->38979 38974 40e3e0 memcpy 38974->38979 38975 40e3b3 wcschr 38975->38979 38976 40e3fb memcpy 38976->38979 38977 40e416 memcpy 38977->38979 38978 40e431 memcpy 38978->38979 38979->38960 38979->38962 38979->38964 38979->38965 38979->38969 38979->38970 38979->38973 38979->38974 38979->38975 38979->38976 38979->38977 38979->38978 38980->38895 38983 40a980 38981->38983 38982 40a8bb 38982->38820 38982->38821 38983->38982 38984 40a995 _wcsicmp 38983->38984 38985 40a99c wcscmp 38983->38985 38984->38983 38985->38983 38986->38824 38987->38828 38989 40aa23 RegEnumValueW 38988->38989 38989->38835 38989->38836 38991 405335 38990->38991 38992 40522a 38990->38992 38991->38421 38993 40b2cc 27 API calls 38992->38993 38994 405234 38993->38994 38995 40a804 8 API calls 38994->38995 38996 40523a 38995->38996 39035 40b273 38996->39035 38998 405248 _mbscpy _mbscat GetProcAddress 38999 40b273 27 API calls 38998->38999 39000 405279 38999->39000 39038 405211 GetProcAddress 39000->39038 39002 405282 39003 40b273 27 API calls 39002->39003 39004 40528f 39003->39004 39039 405211 GetProcAddress 39004->39039 39006 405298 39007 40b273 27 API calls 39006->39007 39008 4052a5 39007->39008 39040 405211 GetProcAddress 39008->39040 39010 4052ae 39011 40b273 27 API calls 39010->39011 39012 4052bb 39011->39012 39041 405211 GetProcAddress 39012->39041 39014 4052c4 39015 40b273 27 API calls 39014->39015 39016 4052d1 39015->39016 39042 405211 GetProcAddress 39016->39042 39018 4052da 39019 40b273 27 API calls 39018->39019 39020 4052e7 39019->39020 39043 405211 GetProcAddress 39020->39043 39022 4052f0 39023 40b273 27 API calls 39022->39023 39024 4052fd 39023->39024 39044 405211 GetProcAddress 39024->39044 39026 405306 39027 40b273 27 API calls 39026->39027 39028 405313 39027->39028 39045 405211 GetProcAddress 39028->39045 39030 40531c 39031 40b273 27 API calls 39030->39031 39032 405329 39031->39032 39046 405211 GetProcAddress 39032->39046 39034 405332 39034->38991 39036 40b58d 27 API calls 39035->39036 39037 40b18c 39036->39037 39037->38998 39038->39002 39039->39006 39040->39010 39041->39014 39042->39018 39043->39022 39044->39026 39045->39030 39046->39034 39048 405220 39 API calls 39047->39048 39049 405369 39048->39049 39049->38853 39049->38854 39050->38856 39051->38860 39052->38857 39053->38854 39055 40440c FreeLibrary 39054->39055 39056 40436d 39055->39056 39057 40a804 8 API calls 39056->39057 39058 404377 39057->39058 39059 404383 39058->39059 39060 404405 39058->39060 39061 40b273 27 API calls 39059->39061 39060->38426 39060->38428 39060->38429 39062 40438d GetProcAddress 39061->39062 39063 40b273 27 API calls 39062->39063 39064 4043a7 GetProcAddress 39063->39064 39065 40b273 27 API calls 39064->39065 39066 4043ba GetProcAddress 39065->39066 39067 40b273 27 API calls 39066->39067 39068 4043ce GetProcAddress 39067->39068 39069 40b273 27 API calls 39068->39069 39070 4043e2 GetProcAddress 39069->39070 39071 4043f1 39070->39071 39072 4043f7 39071->39072 39073 40440c FreeLibrary 39071->39073 39072->39060 39073->39060 39075 404413 FreeLibrary 39074->39075 39076 40441e 39074->39076 39075->39076 39076->38443 39077->38442 39079 40442e 39078->39079 39081 40447e 39078->39081 39080 40b2cc 27 API calls 39079->39080 39082 404438 39080->39082 39081->38442 39083 40a804 8 API calls 39082->39083 39084 40443e 39083->39084 39085 404445 39084->39085 39086 404467 39084->39086 39087 40b273 27 API calls 39085->39087 39086->39081 39089 404475 FreeLibrary 39086->39089 39088 40444f GetProcAddress 39087->39088 39088->39086 39090 404460 39088->39090 39089->39081 39090->39086 39092 4135f6 39091->39092 39093 4135eb FreeLibrary 39091->39093 39092->38446 39093->39092 39095 4449c4 39094->39095 39096 444a52 39094->39096 39097 40b2cc 27 API calls 39095->39097 39096->38463 39096->38468 39098 4449cb 39097->39098 39099 40a804 8 API calls 39098->39099 39100 4449d1 39099->39100 39101 40b273 27 API calls 39100->39101 39102 4449dc GetProcAddress 39101->39102 39103 40b273 27 API calls 39102->39103 39104 4449f3 GetProcAddress 39103->39104 39105 40b273 27 API calls 39104->39105 39106 444a04 GetProcAddress 39105->39106 39107 40b273 27 API calls 39106->39107 39108 444a15 GetProcAddress 39107->39108 39109 40b273 27 API calls 39108->39109 39110 444a26 GetProcAddress 39109->39110 39111 40b273 27 API calls 39110->39111 39112 444a37 GetProcAddress 39111->39112 39113 40b273 27 API calls 39112->39113 39114 444a48 GetProcAddress 39113->39114 39114->39096 39115->38474 39116->38474 39117->38474 39118->38474 39119->38464 39121 403a29 39120->39121 39135 403bed memset memset 39121->39135 39123 403ae7 39148 40b1ab free free 39123->39148 39124 403a3f memset 39129 403a2f 39124->39129 39126 403aef 39126->38483 39127 409d1f 6 API calls 39127->39129 39128 409b98 GetFileAttributesW 39128->39129 39129->39123 39129->39124 39129->39127 39129->39128 39130 40a8d0 7 API calls 39129->39130 39130->39129 39132 40a051 GetFileTime CloseHandle 39131->39132 39133 4039ca CompareFileTime 39131->39133 39132->39133 39133->38483 39134->38480 39136 414c2e 16 API calls 39135->39136 39137 403c38 39136->39137 39138 409719 2 API calls 39137->39138 39139 403c3f wcscat 39138->39139 39140 414c2e 16 API calls 39139->39140 39141 403c61 39140->39141 39142 409719 2 API calls 39141->39142 39143 403c68 wcscat 39142->39143 39149 403af5 39143->39149 39146 403af5 20 API calls 39147 403c95 39146->39147 39147->39129 39148->39126 39150 403b02 39149->39150 39151 40ae18 9 API calls 39150->39151 39153 403b37 39151->39153 39152 40ae51 9 API calls 39152->39153 39153->39152 39154 403bdb 39153->39154 39155 40add4 wcscmp wcscmp 39153->39155 39158 40ae18 9 API calls 39153->39158 39159 40aebe FindClose 39153->39159 39160 40a8d0 7 API calls 39153->39160 39156 40aebe FindClose 39154->39156 39155->39153 39157 403be6 39156->39157 39157->39146 39158->39153 39159->39153 39160->39153 39162 409d1f 6 API calls 39161->39162 39163 404190 39162->39163 39176 409b98 GetFileAttributesW 39163->39176 39165 40419c 39166 4041a7 6 API calls 39165->39166 39167 40435c 39165->39167 39169 40424f 39166->39169 39167->38508 39169->39167 39170 40425e memset 39169->39170 39172 409d1f 6 API calls 39169->39172 39173 40a8ab 9 API calls 39169->39173 39177 414842 39169->39177 39170->39169 39171 404296 wcscpy 39170->39171 39171->39169 39172->39169 39174 4042b6 memset memset _snwprintf wcscpy 39173->39174 39174->39169 39175->38506 39176->39165 39180 41443e 39177->39180 39179 414866 39179->39169 39181 41444b 39180->39181 39182 414451 39181->39182 39183 4144a3 GetPrivateProfileStringW 39181->39183 39184 414491 39182->39184 39185 414455 wcschr 39182->39185 39183->39179 39187 414495 WritePrivateProfileStringW 39184->39187 39185->39184 39186 414463 _snwprintf 39185->39186 39186->39187 39187->39179 39188->38512 39190 40b2cc 27 API calls 39189->39190 39191 409615 39190->39191 39192 409d1f 6 API calls 39191->39192 39193 409625 39192->39193 39218 409b98 GetFileAttributesW 39193->39218 39195 409634 39196 409648 39195->39196 39219 4091b8 memset 39195->39219 39198 40b2cc 27 API calls 39196->39198 39200 408801 39196->39200 39199 40965d 39198->39199 39201 409d1f 6 API calls 39199->39201 39200->38515 39200->38547 39202 40966d 39201->39202 39271 409b98 GetFileAttributesW 39202->39271 39204 40967c 39204->39200 39205 409681 39204->39205 39272 409529 72 API calls 39205->39272 39207 409690 39207->39200 39208->38537 39209->38547 39210->38542 39218->39195 39273 40a6e6 WideCharToMultiByte 39219->39273 39221 409202 39274 444432 39221->39274 39224 40b273 27 API calls 39225 409236 39224->39225 39320 438552 39225->39320 39228 409383 39230 40b273 27 API calls 39228->39230 39232 409399 39230->39232 39231 409254 39234 438552 134 API calls 39232->39234 39252 4093a3 39234->39252 39238 4094ff 39349 443d90 39238->39349 39241 4251c4 137 API calls 39241->39252 39243 409507 39251 40951d 39243->39251 39369 408f2f 77 API calls 39243->39369 39245 4093df 39348 424f26 123 API calls 39245->39348 39249 4253cf 17 API calls 39249->39252 39251->39196 39252->39238 39252->39241 39252->39245 39252->39249 39254 4093e4 39252->39254 39346 4253af 17 API calls 39254->39346 39261 4093ed 39347 4253af 17 API calls 39261->39347 39264 4093f9 39264->39245 39265 409409 memcmp 39264->39265 39265->39245 39271->39204 39272->39207 39273->39221 39370 4438b5 39274->39370 39276 44444c 39277 409215 39276->39277 39384 415a6d 39276->39384 39277->39224 39277->39251 39279 4442e6 11 API calls 39280 44469e 39279->39280 39280->39277 39284 443d90 111 API calls 39280->39284 39281 444486 39282 4444b9 memcpy 39281->39282 39319 4444a4 39281->39319 39388 415258 39282->39388 39284->39277 39285 444524 39286 444541 39285->39286 39287 44452a 39285->39287 39391 444316 39286->39391 39288 416935 16 API calls 39287->39288 39288->39319 39291 444316 18 API calls 39292 444563 39291->39292 39293 444316 18 API calls 39292->39293 39294 44456f 39293->39294 39295 444316 18 API calls 39294->39295 39296 44457f 39295->39296 39296->39319 39405 432d4e 39296->39405 39319->39279 39458 438460 39320->39458 39322 409240 39322->39228 39323 4251c4 39322->39323 39470 424f07 39323->39470 39325 4251e4 39326 4251f7 39325->39326 39327 4251e8 39325->39327 39478 4250f8 39326->39478 39477 4446ea 11 API calls 39327->39477 39329 4251f2 39329->39231 39346->39261 39347->39264 39348->39238 39350 443da3 39349->39350 39351 443db6 39349->39351 39494 41707a 39350->39494 39351->39243 39369->39251 39371 4438d0 39370->39371 39380 4438c9 39370->39380 39372 415378 memcpy memcpy 39371->39372 39373 4438d5 39372->39373 39374 4154e2 10 API calls 39373->39374 39375 443906 39373->39375 39373->39380 39374->39375 39376 443970 memset 39375->39376 39375->39380 39379 44398b 39376->39379 39377 4439a0 39378 415700 10 API calls 39377->39378 39377->39380 39382 4439c0 39378->39382 39379->39377 39381 41975c 10 API calls 39379->39381 39380->39276 39381->39377 39382->39380 39383 418981 10 API calls 39382->39383 39383->39380 39385 415a77 39384->39385 39386 415a8d 39385->39386 39387 415a7e memset 39385->39387 39386->39281 39387->39386 39389 4438b5 11 API calls 39388->39389 39390 41525d 39389->39390 39390->39285 39392 444328 39391->39392 39393 444423 39392->39393 39394 44434e 39392->39394 39395 4446ea 11 API calls 39393->39395 39396 432d4e memset memset memcpy 39394->39396 39403 444381 39395->39403 39397 44435a 39396->39397 39399 444375 39397->39399 39404 44438b 39397->39404 39398 432d4e memset memset memcpy 39400 4443ec 39398->39400 39401 416935 16 API calls 39399->39401 39402 416935 16 API calls 39400->39402 39400->39403 39401->39403 39402->39403 39403->39291 39404->39398 39459 41703f 11 API calls 39458->39459 39460 43847a 39459->39460 39461 43848a 39460->39461 39462 43847e 39460->39462 39464 438270 134 API calls 39461->39464 39463 4446ea 11 API calls 39462->39463 39466 438488 39463->39466 39465 4384aa 39464->39465 39465->39466 39467 424f26 123 API calls 39465->39467 39466->39322 39468 4384bb 39467->39468 39469 438270 134 API calls 39468->39469 39469->39466 39471 424f1f 39470->39471 39472 424f0c 39470->39472 39474 424eea 11 API calls 39471->39474 39473 416760 11 API calls 39472->39473 39475 424f18 39473->39475 39476 424f24 39474->39476 39475->39325 39476->39325 39477->39329 39479 425108 39478->39479 39485 42510d 39478->39485 39480 424f74 124 API calls 39479->39480 39480->39485 39481 42569b 125 API calls 39483 425115 39485->39481 39485->39483 39495 417085 39494->39495 39496 4170ab 39494->39496 39495->39496 39497 416760 11 API calls 39495->39497 39537 413f4f 39510->39537 39513 413f37 K32GetModuleFileNameExW 39514 413f4a 39513->39514 39514->38574 39516 413969 wcscpy 39515->39516 39517 41396c wcschr 39515->39517 39520 413a3a 39516->39520 39517->39516 39519 41398e 39517->39519 39542 4097f7 wcslen wcslen _memicmp 39519->39542 39520->38574 39522 41399a 39523 4139a4 memset 39522->39523 39524 4139e6 39522->39524 39543 409dd5 GetWindowsDirectoryW wcscpy 39523->39543 39526 413a31 wcscpy 39524->39526 39527 4139ec memset 39524->39527 39526->39520 39544 409dd5 GetWindowsDirectoryW wcscpy 39527->39544 39528 4139c9 wcscpy wcscat 39528->39520 39530 413a11 memcpy wcscat 39530->39520 39532 413cb0 GetModuleHandleW 39531->39532 39533 413cda 39531->39533 39532->39533 39534 413cbf GetProcAddress 39532->39534 39535 413ce3 GetProcessTimes 39533->39535 39536 413cf6 39533->39536 39534->39533 39535->38577 39536->38577 39538 413f2f 39537->39538 39539 413f54 39537->39539 39538->39513 39538->39514 39540 40a804 8 API calls 39539->39540 39541 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39540->39541 39541->39538 39542->39522 39543->39528 39544->39530 39545->38597 39546->38620 39548 409cf9 GetVersionExW 39547->39548 39549 409d0a 39547->39549 39548->39549 39549->38627 39549->38630 39550->38633 39551->38636 39552->38638 39553->38704 39555 40bba5 39554->39555 39602 40cc26 39555->39602 39558 40bd4b 39623 40cc0c 39558->39623 39563 40b2cc 27 API calls 39564 40bbef 39563->39564 39630 40ccf0 _wcsicmp 39564->39630 39566 40bbf5 39566->39558 39631 40ccb4 6 API calls 39566->39631 39568 40bc26 39569 40cf04 17 API calls 39568->39569 39570 40bc2e 39569->39570 39571 40bd43 39570->39571 39572 40b2cc 27 API calls 39570->39572 39573 40cc0c 4 API calls 39571->39573 39574 40bc40 39572->39574 39573->39558 39632 40ccf0 _wcsicmp 39574->39632 39576 40bc46 39576->39571 39577 40bc61 memset memset WideCharToMultiByte 39576->39577 39633 40103c strlen 39577->39633 39579 40bcc0 39580 40b273 27 API calls 39579->39580 39581 40bcd0 memcmp 39580->39581 39581->39571 39582 40bce2 39581->39582 39583 404423 37 API calls 39582->39583 39584 40bd10 39583->39584 39584->39571 39585 40bd3a LocalFree 39584->39585 39586 40bd1f memcpy 39584->39586 39585->39571 39586->39585 39587->38718 39589 409a74 GetTempFileNameW 39588->39589 39590 409a66 GetWindowsDirectoryW 39588->39590 39589->38715 39590->39589 39591->38756 39592->38756 39593->38756 39594->38756 39595->38756 39596->38756 39597->38756 39598->38756 39599->38756 39600->38731 39601->38753 39634 4096c3 CreateFileW 39602->39634 39604 40cc34 39605 40cc3d GetFileSize 39604->39605 39606 40bbca 39604->39606 39607 40afcf 2 API calls 39605->39607 39606->39558 39614 40cf04 39606->39614 39608 40cc64 39607->39608 39635 40a2ef ReadFile 39608->39635 39610 40cc71 39636 40ab4a MultiByteToWideChar 39610->39636 39612 40cc95 CloseHandle 39613 40b04b ??3@YAXPAX 39612->39613 39613->39606 39615 40b633 free 39614->39615 39616 40cf14 39615->39616 39642 40b1ab free free 39616->39642 39618 40bbdd 39618->39558 39618->39563 39619 40cf1b 39619->39618 39621 40cfef 39619->39621 39643 40cd4b 39619->39643 39622 40cd4b 14 API calls 39621->39622 39622->39618 39624 40b633 free 39623->39624 39625 40cc15 39624->39625 39626 40aa04 free 39625->39626 39627 40cc1d 39626->39627 39692 40b1ab free free 39627->39692 39629 40b7d4 memset CreateFileW 39629->38710 39629->38711 39630->39566 39631->39568 39632->39576 39633->39579 39634->39604 39635->39610 39637 40ab6b 39636->39637 39641 40ab93 39636->39641 39638 40a9ce 4 API calls 39637->39638 39639 40ab74 39638->39639 39640 40ab7c MultiByteToWideChar 39639->39640 39640->39641 39641->39612 39642->39619 39644 40cd7b 39643->39644 39677 40aa29 39644->39677 39646 40cef5 39647 40aa04 free 39646->39647 39648 40cefd 39647->39648 39648->39619 39650 40aa29 6 API calls 39651 40ce1d 39650->39651 39652 40aa29 6 API calls 39651->39652 39653 40ce3e 39652->39653 39654 40ce6a 39653->39654 39685 40abb7 wcslen memmove 39653->39685 39655 40ce9f 39654->39655 39688 40abb7 wcslen memmove 39654->39688 39657 40a8d0 7 API calls 39655->39657 39660 40ceb5 39657->39660 39658 40ce56 39686 40aa71 wcslen 39658->39686 39667 40a8d0 7 API calls 39660->39667 39662 40ce8b 39689 40aa71 wcslen 39662->39689 39663 40ce5e 39687 40abb7 wcslen memmove 39663->39687 39665 40ce93 39690 40abb7 wcslen memmove 39665->39690 39669 40cecb 39667->39669 39691 40d00b malloc memcpy free free 39669->39691 39671 40cedd 39672 40aa04 free 39671->39672 39673 40cee5 39672->39673 39674 40aa04 free 39673->39674 39675 40ceed 39674->39675 39676 40aa04 free 39675->39676 39676->39646 39678 40aa33 39677->39678 39684 40aa63 39677->39684 39679 40aa44 39678->39679 39680 40aa38 wcslen 39678->39680 39681 40a9ce malloc memcpy free free 39679->39681 39680->39679 39682 40aa4d 39681->39682 39683 40aa51 memcpy 39682->39683 39682->39684 39683->39684 39684->39646 39684->39650 39685->39658 39686->39663 39687->39654 39688->39662 39689->39665 39690->39655 39691->39671 39692->39629 39693->38772 39694->38779 37537 44dea5 37538 44deb5 FreeLibrary 37537->37538 37539 44dec3 37537->37539 37538->37539 39704 4148b6 FindResourceW 39705 4148f9 39704->39705 39706 4148cf SizeofResource 39704->39706 39706->39705 39707 4148e0 LoadResource 39706->39707 39707->39705 39708 4148ee LockResource 39707->39708 39708->39705 37716 415304 free 39709 441b3f 39719 43a9f6 39709->39719 39711 441b61 39892 4386af memset 39711->39892 39713 44189a 39714 442bd4 39713->39714 39715 4418e2 39713->39715 39716 4418ea 39714->39716 39894 441409 memset 39714->39894 39715->39716 39893 4414a9 12 API calls 39715->39893 39720 43aa20 39719->39720 39721 43aadf 39719->39721 39720->39721 39722 43aa34 memset 39720->39722 39721->39711 39723 43aa56 39722->39723 39724 43aa4d 39722->39724 39895 43a6e7 39723->39895 39903 42c02e memset 39724->39903 39729 43aad3 39905 4169a7 11 API calls 39729->39905 39730 43aaae 39730->39721 39730->39729 39745 43aae5 39730->39745 39731 43ac18 39734 43ac47 39731->39734 39907 42bbd5 memcpy memcpy memcpy memset memcpy 39731->39907 39735 43aca8 39734->39735 39908 438eed 16 API calls 39734->39908 39738 43acd5 39735->39738 39910 4233ae 11 API calls 39735->39910 39911 423426 11 API calls 39738->39911 39739 43ac87 39909 4233c5 16 API calls 39739->39909 39743 43ace1 39912 439811 163 API calls 39743->39912 39744 43a9f6 161 API calls 39744->39745 39745->39721 39745->39731 39745->39744 39906 439bbb 22 API calls 39745->39906 39747 43acfd 39752 43ad2c 39747->39752 39913 438eed 16 API calls 39747->39913 39749 43ad19 39914 4233c5 16 API calls 39749->39914 39750 43ad58 39915 44081d 163 API calls 39750->39915 39752->39750 39756 43add9 39752->39756 39755 43ae3a memset 39757 43ae73 39755->39757 39756->39756 39919 423426 11 API calls 39756->39919 39920 42e1c0 147 API calls 39757->39920 39758 43adab 39917 438c4e 163 API calls 39758->39917 39761 43ad6c 39761->39721 39761->39758 39916 42370b memset memcpy memset 39761->39916 39763 43adcc 39918 440f84 12 API calls 39763->39918 39764 43ae96 39921 42e1c0 147 API calls 39764->39921 39767 43aea8 39768 43aec1 39767->39768 39922 42e199 147 API calls 39767->39922 39769 43af00 39768->39769 39923 42e1c0 147 API calls 39768->39923 39769->39721 39773 43af1a 39769->39773 39774 43b3d9 39769->39774 39924 438eed 16 API calls 39773->39924 39779 43b3f6 39774->39779 39783 43b4c8 39774->39783 39776 43b60f 39776->39721 39983 4393a5 17 API calls 39776->39983 39778 43af2f 39925 4233c5 16 API calls 39778->39925 39965 432878 12 API calls 39779->39965 39781 43af51 39926 423426 11 API calls 39781->39926 39791 43b4f2 39783->39791 39971 42bbd5 memcpy memcpy memcpy memset memcpy 39783->39971 39785 43af7d 39927 423426 11 API calls 39785->39927 39789 43b529 39973 44081d 163 API calls 39789->39973 39790 43af94 39928 423330 11 API calls 39790->39928 39972 43a76c 21 API calls 39791->39972 39795 43afca 39929 423330 11 API calls 39795->39929 39796 43b47e 39799 43b497 39796->39799 39968 42374a memcpy memset memcpy memcpy memcpy 39796->39968 39797 43b544 39800 43b55c 39797->39800 39974 42c02e memset 39797->39974 39969 4233ae 11 API calls 39799->39969 39975 43a87a 163 API calls 39800->39975 39801 43afdb 39930 4233ae 11 API calls 39801->39930 39806 43b428 39817 43b462 39806->39817 39966 432b60 16 API calls 39806->39966 39808 43b56c 39811 43b58a 39808->39811 39976 423330 11 API calls 39808->39976 39809 43b4b1 39970 423399 11 API calls 39809->39970 39810 43afee 39931 44081d 163 API calls 39810->39931 39977 440f84 12 API calls 39811->39977 39813 43b4c1 39979 42db80 163 API calls 39813->39979 39967 423330 11 API calls 39817->39967 39819 43b592 39978 43a82f 16 API calls 39819->39978 39822 43b5b4 39980 438c4e 163 API calls 39822->39980 39824 43b5cf 39981 42c02e memset 39824->39981 39826 43b005 39826->39721 39830 43b01f 39826->39830 39932 42d836 163 API calls 39826->39932 39827 43b1ef 39942 4233c5 16 API calls 39827->39942 39830->39827 39940 423330 11 API calls 39830->39940 39941 42d71d 163 API calls 39830->39941 39831 43b212 39943 423330 11 API calls 39831->39943 39832 43b087 39933 4233ae 11 API calls 39832->39933 39833 43add4 39833->39776 39982 438f86 16 API calls 39833->39982 39837 43b22a 39944 42ccb5 11 API calls 39837->39944 39840 43b23f 39945 4233ae 11 API calls 39840->39945 39841 43b10f 39936 423330 11 API calls 39841->39936 39843 43b257 39946 4233ae 11 API calls 39843->39946 39847 43b129 39937 4233ae 11 API calls 39847->39937 39848 43b26e 39947 4233ae 11 API calls 39848->39947 39851 43b09a 39851->39841 39934 42cc15 19 API calls 39851->39934 39935 4233ae 11 API calls 39851->39935 39852 43b282 39948 43a87a 163 API calls 39852->39948 39854 43b13c 39938 440f84 12 API calls 39854->39938 39856 43b29d 39949 423330 11 API calls 39856->39949 39859 43b15f 39939 4233ae 11 API calls 39859->39939 39860 43b2af 39862 43b2b8 39860->39862 39863 43b2ce 39860->39863 39950 4233ae 11 API calls 39862->39950 39951 440f84 12 API calls 39863->39951 39866 43b2c9 39953 4233ae 11 API calls 39866->39953 39867 43b2da 39952 42370b memset memcpy memset 39867->39952 39870 43b2f9 39954 423330 11 API calls 39870->39954 39872 43b30b 39955 423330 11 API calls 39872->39955 39874 43b325 39956 423399 11 API calls 39874->39956 39876 43b332 39957 4233ae 11 API calls 39876->39957 39878 43b354 39958 423399 11 API calls 39878->39958 39880 43b364 39959 43a82f 16 API calls 39880->39959 39882 43b370 39960 42db80 163 API calls 39882->39960 39884 43b380 39961 438c4e 163 API calls 39884->39961 39886 43b39e 39962 423399 11 API calls 39886->39962 39888 43b3ae 39963 43a76c 21 API calls 39888->39963 39890 43b3c3 39964 423399 11 API calls 39890->39964 39892->39713 39893->39716 39894->39714 39896 43a6f5 39895->39896 39902 43a765 39895->39902 39896->39902 39984 42a115 39896->39984 39900 43a73d 39901 42a115 147 API calls 39900->39901 39900->39902 39901->39902 39902->39721 39904 4397fd memset 39902->39904 39903->39723 39904->39730 39905->39721 39906->39745 39907->39734 39908->39739 39909->39735 39910->39738 39911->39743 39912->39747 39913->39749 39914->39752 39915->39761 39916->39758 39917->39763 39918->39833 39919->39755 39920->39764 39921->39767 39922->39768 39923->39768 39924->39778 39925->39781 39926->39785 39927->39790 39928->39795 39929->39801 39930->39810 39931->39826 39932->39832 39933->39851 39934->39851 39935->39851 39936->39847 39937->39854 39938->39859 39939->39830 39940->39830 39941->39830 39942->39831 39943->39837 39944->39840 39945->39843 39946->39848 39947->39852 39948->39856 39949->39860 39950->39866 39951->39867 39952->39866 39953->39870 39954->39872 39955->39874 39956->39876 39957->39878 39958->39880 39959->39882 39960->39884 39961->39886 39962->39888 39963->39890 39964->39833 39965->39806 39966->39817 39967->39796 39968->39799 39969->39809 39970->39813 39971->39791 39972->39789 39973->39797 39974->39800 39975->39808 39976->39811 39977->39819 39978->39813 39979->39822 39980->39824 39981->39833 39982->39776 39983->39721 39985 42a175 39984->39985 39987 42a122 39984->39987 39985->39902 39990 42b13b 147 API calls 39985->39990 39987->39985 39988 42a115 147 API calls 39987->39988 39991 43a174 39987->39991 40015 42a0a8 147 API calls 39987->40015 39988->39987 39990->39900 40005 43a196 39991->40005 40006 43a19e 39991->40006 39992 43a306 39992->40005 40024 4388c4 14 API calls 39992->40024 39995 42a115 147 API calls 39995->40006 39997 43a642 39997->40005 40045 4169a7 11 API calls 39997->40045 40001 43a635 40044 42c02e memset 40001->40044 40005->39987 40006->39992 40006->39995 40006->40005 40016 42ff8c 40006->40016 40032 415a91 40006->40032 40036 4165ff 40006->40036 40039 439504 13 API calls 40006->40039 40040 4312d0 147 API calls 40006->40040 40041 42be4c memcpy memcpy memcpy memset memcpy 40006->40041 40042 43a121 11 API calls 40006->40042 40008 4169a7 11 API calls 40009 43a325 40008->40009 40009->39997 40009->40001 40009->40005 40009->40008 40010 42b5b5 memset memcpy 40009->40010 40011 42bf4c 14 API calls 40009->40011 40014 4165ff 11 API calls 40009->40014 40025 42b63e 40009->40025 40043 42bfcf memcpy 40009->40043 40010->40009 40011->40009 40014->40009 40015->39987 40046 43817e 40016->40046 40018 42ff99 40019 42ffe3 40018->40019 40020 42ffd0 40018->40020 40023 42ff9d 40018->40023 40051 4169a7 11 API calls 40019->40051 40050 4169a7 11 API calls 40020->40050 40023->40006 40024->40009 40198 42b4ec 40025->40198 40027 42b64c 40204 42b5e4 memset 40027->40204 40029 42b65e 40030 42b66d 40029->40030 40205 42b3c6 11 API calls 40029->40205 40030->40009 40033 415a9d 40032->40033 40034 415ab3 40033->40034 40035 415aa4 memset 40033->40035 40034->40006 40035->40034 40206 4165a0 40036->40206 40039->40006 40040->40006 40041->40006 40042->40006 40043->40009 40044->39997 40045->40005 40047 438187 40046->40047 40049 438192 40046->40049 40052 4380f6 40047->40052 40049->40018 40050->40023 40051->40023 40054 43811f 40052->40054 40053 438164 40053->40049 40054->40053 40056 4300e8 3 API calls 40054->40056 40057 437e5e 40054->40057 40056->40054 40080 437d3c 40057->40080 40059 437eb3 40059->40054 40060 437ea9 40060->40059 40065 437f22 40060->40065 40095 41f432 40060->40095 40063 437f06 40142 415c56 11 API calls 40063->40142 40067 437f7f 40065->40067 40068 432d4e 3 API calls 40065->40068 40066 437f95 40143 415c56 11 API calls 40066->40143 40067->40066 40069 43802b 40067->40069 40068->40067 40072 4165ff 11 API calls 40069->40072 40071 437fa3 40071->40059 40145 41f638 104 API calls 40071->40145 40073 438054 40072->40073 40106 437371 40073->40106 40076 43806b 40077 438094 40076->40077 40144 42f50e 138 API calls 40076->40144 40077->40071 40079 4300e8 3 API calls 40077->40079 40079->40071 40081 437d69 40080->40081 40084 437d80 40080->40084 40146 437ccb 11 API calls 40081->40146 40083 437d76 40083->40060 40084->40083 40085 437da3 40084->40085 40087 437d90 40084->40087 40088 438460 134 API calls 40085->40088 40087->40083 40150 437ccb 11 API calls 40087->40150 40091 437dcb 40088->40091 40089 437de8 40149 424f26 123 API calls 40089->40149 40091->40089 40147 444283 13 API calls 40091->40147 40093 437dfc 40148 437ccb 11 API calls 40093->40148 40096 41f54d 40095->40096 40100 41f44f 40095->40100 40097 41f466 40096->40097 40180 41c635 memset memset 40096->40180 40097->40063 40097->40065 40100->40097 40104 41f50b 40100->40104 40151 41f1a5 40100->40151 40176 41c06f memcmp 40100->40176 40177 41f3b1 90 API calls 40100->40177 40178 41f398 86 API calls 40100->40178 40104->40096 40104->40097 40179 41c295 86 API calls 40104->40179 40181 41703f 40106->40181 40108 437399 40109 43739d 40108->40109 40111 4373ac 40108->40111 40188 4446ea 11 API calls 40109->40188 40112 416935 16 API calls 40111->40112 40128 4373ca 40112->40128 40113 437584 40115 4375bc 40113->40115 40195 42453e 123 API calls 40113->40195 40114 438460 134 API calls 40114->40128 40117 415c7d 16 API calls 40115->40117 40118 4375d2 40117->40118 40120 4442e6 11 API calls 40118->40120 40122 4373a7 40118->40122 40119 4251c4 137 API calls 40119->40128 40121 4375e2 40120->40121 40121->40122 40196 444283 13 API calls 40121->40196 40122->40076 40124 415a91 memset 40124->40128 40127 43758f 40194 42453e 123 API calls 40127->40194 40128->40113 40128->40114 40128->40119 40128->40124 40128->40127 40141 437d3c 135 API calls 40128->40141 40189 425433 13 API calls 40128->40189 40190 425413 17 API calls 40128->40190 40191 42533e 16 API calls 40128->40191 40192 42538f 16 API calls 40128->40192 40193 42453e 123 API calls 40128->40193 40131 4375f4 40135 437620 40131->40135 40136 43760b 40131->40136 40133 43759f 40134 416935 16 API calls 40133->40134 40134->40113 40137 416935 16 API calls 40135->40137 40197 444283 13 API calls 40136->40197 40137->40122 40140 437612 memcpy 40140->40122 40141->40128 40142->40059 40143->40071 40144->40077 40145->40059 40146->40083 40147->40093 40148->40089 40149->40083 40150->40083 40152 41bc3b 101 API calls 40151->40152 40153 41f1b4 40152->40153 40154 41edad 86 API calls 40153->40154 40161 41f282 40153->40161 40155 41f1cb 40154->40155 40156 41f1f5 memcmp 40155->40156 40157 41f20e 40155->40157 40155->40161 40156->40157 40158 41f21b memcmp 40157->40158 40157->40161 40159 41f326 40158->40159 40162 41f23d 40158->40162 40160 41ee6b 86 API calls 40159->40160 40159->40161 40160->40161 40161->40100 40162->40159 40163 41f28e memcmp 40162->40163 40165 41c8df 56 API calls 40162->40165 40163->40159 40164 41f2a9 40163->40164 40164->40159 40167 41f308 40164->40167 40168 41f2d8 40164->40168 40166 41f269 40165->40166 40166->40159 40169 41f287 40166->40169 40170 41f27a 40166->40170 40167->40159 40174 4446ce 11 API calls 40167->40174 40171 41ee6b 86 API calls 40168->40171 40169->40163 40172 41ee6b 86 API calls 40170->40172 40173 41f2e0 40171->40173 40172->40161 40175 41b1ca memset 40173->40175 40174->40159 40175->40161 40176->40100 40177->40100 40178->40100 40179->40096 40180->40097 40182 417044 40181->40182 40183 41705c 40181->40183 40185 416760 11 API calls 40182->40185 40187 417055 40182->40187 40184 417075 40183->40184 40186 41707a 11 API calls 40183->40186 40184->40108 40185->40187 40186->40182 40187->40108 40188->40122 40189->40128 40190->40128 40191->40128 40192->40128 40193->40128 40194->40133 40195->40115 40196->40131 40197->40140 40200 42b4ff 40198->40200 40199 415a91 memset 40201 42b52c 40199->40201 40200->40199 40202 42b553 memcpy 40201->40202 40203 42b545 40201->40203 40202->40203 40203->40027 40204->40029 40205->40030 40211 415cfe 40206->40211 40212 41628e 40211->40212 40217 415d23 __aullrem __aulldvrm 40211->40217 40219 416520 40212->40219 40213 4163ca 40225 416422 11 API calls 40213->40225 40215 416422 10 API calls 40215->40217 40216 416172 memset 40216->40217 40217->40212 40217->40213 40217->40215 40217->40216 40218 415cb9 10 API calls 40217->40218 40218->40217 40220 416527 40219->40220 40224 416574 40219->40224 40222 416544 40220->40222 40220->40224 40226 4156aa 11 API calls 40220->40226 40223 416561 memcpy 40222->40223 40222->40224 40223->40224 40224->40006 40225->40212 40226->40222 40248 41493c EnumResourceNamesW 37541 4287c1 37542 4287d2 37541->37542 37543 429ac1 37541->37543 37544 428818 37542->37544 37545 42881f 37542->37545 37559 425711 37542->37559 37558 425ad6 37543->37558 37611 415c56 11 API calls 37543->37611 37578 42013a 37544->37578 37606 420244 97 API calls 37545->37606 37550 4260dd 37605 424251 120 API calls 37550->37605 37552 4259da 37604 416760 11 API calls 37552->37604 37557 429a4d 37561 429a66 37557->37561 37562 429a9b 37557->37562 37559->37543 37559->37552 37559->37557 37560 422aeb memset memcpy memcpy 37559->37560 37564 4260a1 37559->37564 37574 4259c2 37559->37574 37577 425a38 37559->37577 37594 4227f0 memset memcpy 37559->37594 37595 422b84 15 API calls 37559->37595 37596 422b5d memset memcpy memcpy 37559->37596 37597 422640 13 API calls 37559->37597 37599 4241fc 11 API calls 37559->37599 37600 42413a 90 API calls 37559->37600 37560->37559 37607 415c56 11 API calls 37561->37607 37566 429a96 37562->37566 37609 416760 11 API calls 37562->37609 37603 415c56 11 API calls 37564->37603 37610 424251 120 API calls 37566->37610 37569 429a7a 37608 416760 11 API calls 37569->37608 37574->37558 37598 415c56 11 API calls 37574->37598 37577->37574 37601 422640 13 API calls 37577->37601 37602 4226e0 12 API calls 37577->37602 37579 42014c 37578->37579 37582 420151 37578->37582 37621 41e466 97 API calls 37579->37621 37581 420162 37581->37559 37582->37581 37583 4201b3 37582->37583 37584 420229 37582->37584 37585 4201b8 37583->37585 37586 4201dc 37583->37586 37584->37581 37587 41fd5e 86 API calls 37584->37587 37612 41fbdb 37585->37612 37586->37581 37590 4201ff 37586->37590 37618 41fc4c 37586->37618 37587->37581 37590->37581 37593 42013a 97 API calls 37590->37593 37593->37581 37594->37559 37595->37559 37596->37559 37597->37559 37598->37552 37599->37559 37600->37559 37601->37577 37602->37577 37603->37552 37604->37550 37605->37558 37606->37559 37607->37569 37608->37566 37609->37566 37610->37543 37611->37552 37613 41fbf8 37612->37613 37616 41fbf1 37612->37616 37626 41ee26 37613->37626 37617 41fc39 37616->37617 37636 4446ce 11 API calls 37616->37636 37617->37581 37622 41fd5e 37617->37622 37619 41ee6b 86 API calls 37618->37619 37620 41fc5d 37619->37620 37620->37586 37621->37582 37624 41fd65 37622->37624 37623 41fdab 37623->37581 37624->37623 37625 41fbdb 86 API calls 37624->37625 37625->37624 37627 41ee41 37626->37627 37628 41ee32 37626->37628 37637 41edad 37627->37637 37640 4446ce 11 API calls 37628->37640 37631 41ee3c 37631->37616 37634 41ee58 37634->37631 37642 41ee6b 37634->37642 37636->37617 37646 41be52 37637->37646 37640->37631 37641 41eb85 11 API calls 37641->37634 37643 41ee70 37642->37643 37644 41ee78 37642->37644 37702 41bf99 86 API calls 37643->37702 37644->37631 37647 41be6f 37646->37647 37648 41be5f 37646->37648 37653 41be8c 37647->37653 37667 418c63 37647->37667 37681 4446ce 11 API calls 37648->37681 37651 41be69 37651->37631 37651->37641 37653->37651 37654 41bf3a 37653->37654 37655 41bed1 37653->37655 37658 41bee7 37653->37658 37684 4446ce 11 API calls 37654->37684 37657 41bef0 37655->37657 37661 41bee2 37655->37661 37657->37658 37659 41bf01 37657->37659 37658->37651 37685 41a453 86 API calls 37658->37685 37660 41bf24 memset 37659->37660 37665 41bf14 37659->37665 37682 418a6d memset memcpy memset 37659->37682 37660->37651 37671 41ac13 37661->37671 37683 41a223 memset memcpy memset 37665->37683 37666 41bf20 37666->37660 37670 418c72 37667->37670 37668 418c94 37668->37653 37669 418d51 memset memset 37669->37668 37670->37668 37670->37669 37672 41ac52 37671->37672 37673 41ac3f memset 37671->37673 37675 41ac6a 37672->37675 37686 41dc14 19 API calls 37672->37686 37678 41acd9 37673->37678 37677 41aca1 37675->37677 37687 41519d 37675->37687 37677->37678 37679 41acc0 memset 37677->37679 37680 41accd memcpy 37677->37680 37678->37658 37679->37678 37680->37678 37681->37651 37682->37665 37683->37666 37684->37658 37686->37675 37690 4175ed 37687->37690 37698 417570 SetFilePointer 37690->37698 37693 41760a ReadFile 37694 417637 37693->37694 37695 417627 GetLastError 37693->37695 37696 41763e memset 37694->37696 37697 4151b3 37694->37697 37695->37697 37696->37697 37697->37677 37699 4175b2 37698->37699 37700 41759c GetLastError 37698->37700 37699->37693 37699->37697 37700->37699 37701 4175a8 GetLastError 37700->37701 37701->37699 37702->37644 37703 417bc5 37704 417c61 37703->37704 37705 417bda 37703->37705 37705->37704 37706 417bf6 UnmapViewOfFile CloseHandle 37705->37706 37708 417c2c 37705->37708 37710 4175b7 37705->37710 37706->37705 37706->37706 37708->37705 37715 41851e 20 API calls 37708->37715 37711 4175d6 CloseHandle 37710->37711 37712 4175c8 37711->37712 37713 4175df 37711->37713 37712->37713 37714 4175ce Sleep 37712->37714 37713->37705 37714->37711 37715->37708 39695 4147f3 39698 414561 39695->39698 39697 414813 39699 41456d 39698->39699 39700 41457f GetPrivateProfileIntW 39698->39700 39703 4143f1 memset _itow WritePrivateProfileStringW 39699->39703 39700->39697 39702 41457a 39702->39697 39703->39702

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040DDAD
                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                    • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                      • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                    • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                    • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                    • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                    • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                    • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                    • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                    • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                    • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                    • memset.MSVCRT ref: 0040DF5F
                                                                                    • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                    • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                    • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                    • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                    • API String ID: 708747863-3398334509
                                                                                    • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                    • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                    • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                    • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                                    APIs
                                                                                      • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                      • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                      • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                    • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                    • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                    • free.MSVCRT ref: 00418803
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                    • String ID:
                                                                                    • API String ID: 1355100292-0
                                                                                    • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                    • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                    • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                    • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                    APIs
                                                                                    • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                    • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFind$FirstNext
                                                                                    • String ID:
                                                                                    • API String ID: 1690352074-0
                                                                                    • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                    • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                    • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                    • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0041898C
                                                                                    • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoSystemmemset
                                                                                    • String ID:
                                                                                    • API String ID: 3558857096-0
                                                                                    • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                    • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                    • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                    • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 43 44558e-445594 call 444b06 4->43 44 44557e-44558c call 4136c0 call 41366b 4->44 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 46 445823-445826 14->46 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 58 445879-44587c 18->58 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 77 445685 21->77 78 4456b2-4456b5 call 40b1ab 21->78 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 140 44592d-445945 call 40b6ef 24->140 141 44594a 24->141 38 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->38 39 445b29-445b32 28->39 145 4459d0-4459e8 call 40b6ef 29->145 146 4459ed 29->146 30->21 42 445609-44560d 30->42 31->30 182 445b08-445b15 call 40ae51 38->182 47 445c7c-445c85 39->47 48 445b38-445b96 memset * 3 39->48 42->21 56 44560f-445641 call 4087b3 call 40a889 call 4454bf 42->56 43->3 44->43 49 44584c-445854 call 40b1ab 46->49 50 445828 46->50 70 445d1c-445d25 47->70 71 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 47->71 63 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 48->63 64 445b98-445ba0 48->64 49->13 65 44582e-445847 call 40a9b5 call 4087b3 50->65 156 445665-445670 call 40b1ab 56->156 157 445643-445663 call 40a9b5 call 4087b3 56->157 61 4458a2-4458aa call 40b1ab 58->61 62 44587e 58->62 61->19 75 445884-44589d call 40a9b5 call 4087b3 62->75 249 445c77 63->249 64->63 76 445ba2-445bcf call 4099c6 call 445403 call 445389 64->76 143 445849 65->143 82 445fae-445fb2 70->82 83 445d2b-445d3b 70->83 160 445cf5 71->160 161 445cfc-445d03 71->161 148 44589f 75->148 76->47 93 44568b-4456a4 call 40a9b5 call 4087b3 77->93 109 4456ba-4456c4 78->109 98 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 83->98 99 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 83->99 150 4456a9-4456b0 93->150 166 445d67-445d6c 98->166 167 445d71-445d83 call 445093 98->167 196 445e17 99->196 197 445e1e-445e25 99->197 122 4457f9 109->122 123 4456ca-4456d3 call 413cfa call 413d4c 109->123 122->6 174 4456d8-4456f7 call 40b2cc call 413fa6 123->174 140->141 141->23 143->49 145->146 146->28 148->61 150->78 150->93 156->109 157->156 160->161 171 445d05-445d13 161->171 172 445d17 161->172 176 445fa1-445fa9 call 40b6ef 166->176 167->82 171->172 172->70 207 4456fd-445796 memset * 4 call 409c70 * 3 174->207 208 4457ea-4457f7 call 413d29 174->208 176->82 202 445b17-445b27 call 40aebe 182->202 203 445aa3-445ab0 call 40add4 182->203 196->197 198 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->198 199 445e6b-445e7e call 445093 197->199 239 445e62-445e69 198->239 240 445e5b 198->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 199->220 202->39 203->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 203->221 207->208 248 445798-4457ca call 40b2cc call 409d1f call 409b98 207->248 208->10 220->82 253 445f9b 220->253 221->182 239->199 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 265 445f4d-445f5a call 40ae51 245->265 248->208 264 4457cc-4457e5 call 4087b3 248->264 249->47 253->176 264->208 269 445ef7-445f04 call 40add4 265->269 270 445f5c-445f62 call 40aebe 265->270 269->265 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->265 281 445f3a-445f48 call 445093 274->281 281->265
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 004455C2
                                                                                    • wcsrchr.MSVCRT ref: 004455DA
                                                                                    • memset.MSVCRT ref: 0044570D
                                                                                    • memset.MSVCRT ref: 00445725
                                                                                      • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                      • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                      • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                      • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                      • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                      • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                      • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                      • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                    • memset.MSVCRT ref: 0044573D
                                                                                    • memset.MSVCRT ref: 00445755
                                                                                    • memset.MSVCRT ref: 004458CB
                                                                                    • memset.MSVCRT ref: 004458E3
                                                                                    • memset.MSVCRT ref: 0044596E
                                                                                    • memset.MSVCRT ref: 00445A10
                                                                                    • memset.MSVCRT ref: 00445A28
                                                                                    • memset.MSVCRT ref: 00445AC6
                                                                                      • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                      • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                      • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                      • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                      • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                    • memset.MSVCRT ref: 00445B52
                                                                                    • memset.MSVCRT ref: 00445B6A
                                                                                    • memset.MSVCRT ref: 00445C9B
                                                                                    • memset.MSVCRT ref: 00445CB3
                                                                                    • _wcsicmp.MSVCRT ref: 00445D56
                                                                                    • memset.MSVCRT ref: 00445B82
                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                    • memset.MSVCRT ref: 00445986
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                    • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                    • API String ID: 2263259095-3798722523
                                                                                    • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                    • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                    • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                    • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                      • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                      • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                      • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                    • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                    • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                    • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                    • String ID: $/deleteregkey$/savelangfile
                                                                                    • API String ID: 2744995895-28296030
                                                                                    • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                    • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                    • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                    • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040B71C
                                                                                      • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                      • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                    • wcsrchr.MSVCRT ref: 0040B738
                                                                                    • memset.MSVCRT ref: 0040B756
                                                                                    • memset.MSVCRT ref: 0040B7F5
                                                                                    • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                    • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                    • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                    • memset.MSVCRT ref: 0040B851
                                                                                    • memset.MSVCRT ref: 0040B8CA
                                                                                    • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                    • memset.MSVCRT ref: 0040BB53
                                                                                    • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                    • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateDeleteHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                                    • String ID: chp$v10
                                                                                    • API String ID: 4165125987-2783969131
                                                                                    • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                    • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                    • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                    • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 511 40e304-40e316 call 406e8f 510->511 516 40e476-40e483 call 406b53 511->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 511->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->511 524->509 530 40e497-40e49f free 524->530 530->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 549 40e3b0 542->549 550 40e3b3-40e3c1 wcschr 542->550 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 551 40e3fb-40e40c memcpy 548->551 552 40e40f-40e414 548->552 549->550 550->541 553 40e3c3-40e3c6 550->553 551->552 554 40e416-40e427 memcpy 552->554 555 40e42a-40e42f 552->555 553->541 554->555 556 40e431-40e442 memcpy 555->556 557 40e445-40e44a 555->557 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                                                    APIs
                                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                    • free.MSVCRT ref: 0040E49A
                                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                    • memset.MSVCRT ref: 0040E380
                                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                    • wcschr.MSVCRT ref: 0040E3B8
                                                                                    • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E3EC
                                                                                    • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E407
                                                                                    • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E422
                                                                                    • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E43D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                    • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                    • API String ID: 3849927982-2252543386
                                                                                    • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                    • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                    • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                    • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 601 4094f7-4094fa call 424f26 598->601 600->567 601->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 615 4093e4-4093fb call 4253af * 2 613->615 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->601 627 409401-409403 615->627 616->617 618 409333-409345 memcmp 617->618 619 4092e5-4092ec 617->619 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->601 628 409409-40941b memcmp 627->628 628->601 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->601 633 4094b8-4094ed memcpy * 2 630->633 631->601 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->601
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 004091E2
                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                    • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                    • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                    • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                    • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                    • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                    • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                    • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                    • String ID:
                                                                                    • API String ID: 3715365532-3916222277
                                                                                    • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                    • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                    • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                    • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 643 413eb7-413ebd 641->643 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 643->645 646 413ebf-413ec6 free 643->646 648 413edb-413ee2 645->648 646->648 656 413ee4 648->656 657 413ee7-413efe 648->657 662 413ea2-413eae CloseHandle 650->662 654 413e61-413e68 651->654 655 413e37-413e44 GetModuleHandleW 651->655 654->650 658 413e6a-413e76 654->658 655->654 660 413e46-413e5c GetProcAddress 655->660 656->657 657->638 658->650 660->654 662->641
                                                                                    APIs
                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                    • memset.MSVCRT ref: 00413D7F
                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                    • memset.MSVCRT ref: 00413E07
                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                    • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                    • free.MSVCRT ref: 00413EC1
                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                    • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                    • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                    • API String ID: 1344430650-1740548384
                                                                                    • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                    • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                    • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                    • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                      • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                      • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                      • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                      • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                      • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                    • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                    • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                    • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                      • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                      • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                      • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                    • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                    • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                    • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                    • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                    • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                    • String ID: bhv
                                                                                    • API String ID: 4234240956-2689659898
                                                                                    • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                    • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                    • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                    • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                                                    APIs
                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                    • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                    • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                    • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                    • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                    • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                    • API String ID: 2941347001-70141382
                                                                                    • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                    • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                    • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                    • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 696 4466f4-44670e call 446904 GetModuleHandleA 699 446710-44671b 696->699 700 44672f-446732 696->700 699->700 702 44671d-446726 699->702 701 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 700->701 711 4467ac-4467b7 __setusermatherr 701->711 712 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 701->712 704 446747-44674b 702->704 705 446728-44672d 702->705 704->700 706 44674d-44674f 704->706 705->700 708 446734-44673b 705->708 710 446755-446758 706->710 708->700 709 44673d-446745 708->709 709->710 710->701 711->712 715 446810-446819 712->715 716 44681e-446825 712->716 717 4468d8-4468dd call 44693d 715->717 718 446827-446832 716->718 719 44686c-446870 716->719 723 446834-446838 718->723 724 44683a-44683e 718->724 721 446845-44684b 719->721 722 446872-446877 719->722 727 446853-446864 GetStartupInfoW 721->727 728 44684d-446851 721->728 722->719 723->718 723->724 724->721 726 446840-446842 724->726 726->721 729 446866-44686a 727->729 730 446879-44687b 727->730 728->726 728->727 731 44687c-446894 GetModuleHandleA call 41276d 729->731 730->731 734 446896-446897 exit 731->734 735 44689d-4468d6 _cexit 731->735 734->735 735->717
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                    • String ID:
                                                                                    • API String ID: 2827331108-0
                                                                                    • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                    • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                    • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                    • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040C298
                                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                    • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                    • wcschr.MSVCRT ref: 0040C324
                                                                                    • wcschr.MSVCRT ref: 0040C344
                                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                    • GetLastError.KERNEL32 ref: 0040C373
                                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                    • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                    • String ID: visited:
                                                                                    • API String ID: 1157525455-1702587658
                                                                                    • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                    • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                    • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                    • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 762 40e175-40e1a1 call 40695d call 406b90 767 40e1a7-40e1e5 memset 762->767 768 40e299-40e2a8 call 4069a3 762->768 770 40e1e8-40e1fa call 406e8f 767->770 774 40e270-40e27d call 406b53 770->774 775 40e1fc-40e219 call 40dd50 * 2 770->775 774->770 780 40e283-40e286 774->780 775->774 786 40e21b-40e21d 775->786 783 40e291-40e294 call 40aa04 780->783 784 40e288-40e290 free 780->784 783->768 784->783 786->774 787 40e21f-40e235 call 40742e 786->787 787->774 790 40e237-40e242 call 40aae3 787->790 790->774 793 40e244-40e26b _snwprintf call 40a8d0 790->793 793->774
                                                                                    APIs
                                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                    • memset.MSVCRT ref: 0040E1BD
                                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                    • free.MSVCRT ref: 0040E28B
                                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                      • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                      • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                    • _snwprintf.MSVCRT ref: 0040E257
                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                    • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                    • API String ID: 2804212203-2982631422
                                                                                    • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                                                    • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                    • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                                                    • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                      • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                    • memset.MSVCRT ref: 0040BC75
                                                                                    • memset.MSVCRT ref: 0040BC8C
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                    • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                    • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                    • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                    • String ID:
                                                                                    • API String ID: 115830560-3916222277
                                                                                    • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                    • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                    • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                    • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 847 41837f-4183bf 848 4183c1-4183cc call 418197 847->848 849 4183dc-4183ec call 418160 847->849 854 4183d2-4183d8 848->854 855 418517-41851d 848->855 856 4183f6-41840b 849->856 857 4183ee-4183f1 849->857 854->849 858 418417-418423 856->858 859 41840d-418415 856->859 857->855 860 418427-418442 call 41739b 858->860 859->860 863 418444-41845d CreateFileW 860->863 864 41845f-418475 CreateFileA 860->864 865 418477-41847c 863->865 864->865 866 4184c2-4184c7 865->866 867 41847e-418495 GetLastError free 865->867 870 4184d5-418501 memset call 418758 866->870 871 4184c9-4184d3 866->871 868 4184b5-4184c0 call 444706 867->868 869 418497-4184b3 call 41837f 867->869 868->855 869->855 877 418506-418515 free 870->877 871->870 877->855
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                    • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                    • GetLastError.KERNEL32 ref: 0041847E
                                                                                    • free.MSVCRT ref: 0041848B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile$ErrorLastfree
                                                                                    • String ID: |A
                                                                                    • API String ID: 77810686-1717621600
                                                                                    • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                    • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                    • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                    • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0041249C
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                    • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                    • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                    • wcscpy.MSVCRT ref: 004125A0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                    • String ID: r!A
                                                                                    • API String ID: 2791114272-628097481
                                                                                    • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                    • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                    • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                    • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                    APIs
                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                      • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                      • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                      • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                      • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                      • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                    • _wcslwr.MSVCRT ref: 0040C817
                                                                                      • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                      • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                    • wcslen.MSVCRT ref: 0040C82C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                    • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                    • API String ID: 2936932814-4196376884
                                                                                    • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                    • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                    • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                    • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                    • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                    • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                    • String ID: BIN
                                                                                    • API String ID: 1668488027-1015027815
                                                                                    • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                    • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                    • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                    • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                    APIs
                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                    • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                    • wcslen.MSVCRT ref: 0040BE06
                                                                                    • wcsncmp.MSVCRT ref: 0040BE38
                                                                                    • memset.MSVCRT ref: 0040BE91
                                                                                    • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                    • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                    • wcschr.MSVCRT ref: 0040BF24
                                                                                    • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                    • String ID:
                                                                                    • API String ID: 697348961-0
                                                                                    • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                    • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                    • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                    • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00403CBF
                                                                                    • memset.MSVCRT ref: 00403CD4
                                                                                    • memset.MSVCRT ref: 00403CE9
                                                                                    • memset.MSVCRT ref: 00403CFE
                                                                                    • memset.MSVCRT ref: 00403D13
                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                    • memset.MSVCRT ref: 00403DDA
                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                    • String ID: Waterfox$Waterfox\Profiles
                                                                                    • API String ID: 3527940856-11920434
                                                                                    • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                    • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                    • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                    • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00403E50
                                                                                    • memset.MSVCRT ref: 00403E65
                                                                                    • memset.MSVCRT ref: 00403E7A
                                                                                    • memset.MSVCRT ref: 00403E8F
                                                                                    • memset.MSVCRT ref: 00403EA4
                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                    • memset.MSVCRT ref: 00403F6B
                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                    • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                    • API String ID: 3527940856-2068335096
                                                                                    • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                    • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                    • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                    • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00403FE1
                                                                                    • memset.MSVCRT ref: 00403FF6
                                                                                    • memset.MSVCRT ref: 0040400B
                                                                                    • memset.MSVCRT ref: 00404020
                                                                                    • memset.MSVCRT ref: 00404035
                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                    • memset.MSVCRT ref: 004040FC
                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                    • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                    • API String ID: 3527940856-3369679110
                                                                                    • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                    • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                    • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                    • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                    APIs
                                                                                    • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy
                                                                                    • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                    • API String ID: 3510742995-2641926074
                                                                                    • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                    • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                    • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                    • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                    APIs
                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                      • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                      • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                    • memset.MSVCRT ref: 004033B7
                                                                                    • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                    • wcscmp.MSVCRT ref: 004033FC
                                                                                    • _wcsicmp.MSVCRT ref: 00403439
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                    • String ID: $0.@
                                                                                    • API String ID: 2758756878-1896041820
                                                                                    • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                    • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                    • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                    • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                    APIs
                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                    • String ID:
                                                                                    • API String ID: 2941347001-0
                                                                                    • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                    • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                    • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                    • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00403C09
                                                                                    • memset.MSVCRT ref: 00403C1E
                                                                                      • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                      • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                    • wcscat.MSVCRT ref: 00403C47
                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                    • wcscat.MSVCRT ref: 00403C70
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memsetwcscat$Closewcscpywcslen
                                                                                    • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                    • API String ID: 3249829328-1174173950
                                                                                    • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                    • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                    • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                    • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040A824
                                                                                    • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                    • wcscpy.MSVCRT ref: 0040A854
                                                                                    • wcscat.MSVCRT ref: 0040A86A
                                                                                    • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                    • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                    • String ID:
                                                                                    • API String ID: 669240632-0
                                                                                    • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                    • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                    • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                    • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                    APIs
                                                                                    • wcschr.MSVCRT ref: 00414458
                                                                                    • _snwprintf.MSVCRT ref: 0041447D
                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                    • String ID: "%s"
                                                                                    • API String ID: 1343145685-3297466227
                                                                                    • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                    • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                    • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                    • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                    • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                    • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProcProcessTimes
                                                                                    • String ID: GetProcessTimes$kernel32.dll
                                                                                    • API String ID: 1714573020-3385500049
                                                                                    • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                    • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                    • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                    • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 004087D6
                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                      • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                    • memset.MSVCRT ref: 00408828
                                                                                    • memset.MSVCRT ref: 00408840
                                                                                    • memset.MSVCRT ref: 00408858
                                                                                    • memset.MSVCRT ref: 00408870
                                                                                    • memset.MSVCRT ref: 00408888
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                    • String ID:
                                                                                    • API String ID: 2911713577-0
                                                                                    • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                    • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                    • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                    • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                    APIs
                                                                                    • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                    • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                    • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcmp
                                                                                    • String ID: @ $SQLite format 3
                                                                                    • API String ID: 1475443563-3708268960
                                                                                    • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                    • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                    • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                    • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                    APIs
                                                                                      • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                    • memset.MSVCRT ref: 00414C87
                                                                                    • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                    • wcscpy.MSVCRT ref: 00414CFC
                                                                                      • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                    Strings
                                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressCloseProcVersionmemsetwcscpy
                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                    • API String ID: 2705122986-2036018995
                                                                                    • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                    • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                    • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                    • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmpqsort
                                                                                    • String ID: /nosort$/sort
                                                                                    • API String ID: 1579243037-1578091866
                                                                                    • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                    • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                    • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                    • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040E60F
                                                                                    • memset.MSVCRT ref: 0040E629
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                    Strings
                                                                                    • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                    • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                    • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                    • API String ID: 3354267031-2114579845
                                                                                    • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                    • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                    • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                    • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                    APIs
                                                                                    • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                    • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                    • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                    • String ID:
                                                                                    • API String ID: 3473537107-0
                                                                                    • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                    • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                    • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                    • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                    APIs
                                                                                    Strings
                                                                                    • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset
                                                                                    • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                    • API String ID: 2221118986-1725073988
                                                                                    • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                    • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                    • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                    • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                    • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@DeleteObject
                                                                                    • String ID: r!A
                                                                                    • API String ID: 1103273653-628097481
                                                                                    • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                    • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                    • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                    • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                    APIs
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@
                                                                                    • String ID:
                                                                                    • API String ID: 1033339047-0
                                                                                    • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                    • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                    • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                    • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                    APIs
                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                    • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$memcmp
                                                                                    • String ID: $$8
                                                                                    • API String ID: 2808797137-435121686
                                                                                    • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                    • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                    • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                    • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                    APIs
                                                                                      • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                      • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                      • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                      • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                      • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                      • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                      • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                      • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                      • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                    • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                      • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                      • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                      • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,74DF2EE0), ref: 0040E3EC
                                                                                    • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                    • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                      • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                      • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                      • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                    • String ID:
                                                                                    • API String ID: 1979745280-0
                                                                                    • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                    • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                    • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                    • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                    APIs
                                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                    • memset.MSVCRT ref: 00403A55
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                    • String ID: history.dat$places.sqlite
                                                                                    • API String ID: 2641622041-467022611
                                                                                    • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                    • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                    • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                    • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                    APIs
                                                                                      • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                    • GetLastError.KERNEL32 ref: 00417627
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$File$PointerRead
                                                                                    • String ID:
                                                                                    • API String ID: 839530781-0
                                                                                    • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                    • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                    • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                    • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFindFirst
                                                                                    • String ID: *.*$index.dat
                                                                                    • API String ID: 1974802433-2863569691
                                                                                    • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                    • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                    • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                    • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                    APIs
                                                                                    • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                    • GetLastError.KERNEL32 ref: 004175A2
                                                                                    • GetLastError.KERNEL32 ref: 004175A8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$FilePointer
                                                                                    • String ID:
                                                                                    • API String ID: 1156039329-0
                                                                                    • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                    • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                    • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                    • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                    • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                    • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CloseCreateHandleTime
                                                                                    • String ID:
                                                                                    • API String ID: 3397143404-0
                                                                                    • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                    • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                    • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                    • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                    APIs
                                                                                    • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                    • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Temp$DirectoryFileNamePathWindows
                                                                                    • String ID:
                                                                                    • API String ID: 1125800050-0
                                                                                    • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                    • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                    • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                    • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                    • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandleSleep
                                                                                    • String ID: }A
                                                                                    • API String ID: 252777609-2138825249
                                                                                    • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                    • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                    • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                    • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                    APIs
                                                                                    • malloc.MSVCRT ref: 00409A10
                                                                                    • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                    • free.MSVCRT ref: 00409A31
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: freemallocmemcpy
                                                                                    • String ID:
                                                                                    • API String ID: 3056473165-0
                                                                                    • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                    • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                    • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                    • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: d
                                                                                    • API String ID: 0-2564639436
                                                                                    • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                    • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                    • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                    • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset
                                                                                    • String ID: BINARY
                                                                                    • API String ID: 2221118986-907554435
                                                                                    • Opcode ID: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                                                                    • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                    • Opcode Fuzzy Hash: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                                                                    • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmp
                                                                                    • String ID: /stext
                                                                                    • API String ID: 2081463915-3817206916
                                                                                    • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                    • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                    • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                    • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                    APIs
                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                    • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                    • String ID:
                                                                                    • API String ID: 2445788494-0
                                                                                    • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                    • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                    • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                    • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                    APIs
                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                    • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                    • String ID:
                                                                                    • API String ID: 3150196962-0
                                                                                    • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                    • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                    • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                    • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                    APIs
                                                                                    Strings
                                                                                    • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: malloc
                                                                                    • String ID: failed to allocate %u bytes of memory
                                                                                    • API String ID: 2803490479-1168259600
                                                                                    • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                    • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                    • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                    • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0041BDDF
                                                                                    • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcmpmemset
                                                                                    • String ID:
                                                                                    • API String ID: 1065087418-0
                                                                                    • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                    • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                    • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                    • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                    APIs
                                                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                    • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                      • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                      • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                      • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                    • String ID:
                                                                                    • API String ID: 1381354015-0
                                                                                    • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                    • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                    • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                    • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset
                                                                                    • String ID:
                                                                                    • API String ID: 2221118986-0
                                                                                    • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                    • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                                                                    • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                                                    • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 004301AD
                                                                                    • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpymemset
                                                                                    • String ID:
                                                                                    • API String ID: 1297977491-0
                                                                                    • Opcode ID: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                                                    • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                                    • Opcode Fuzzy Hash: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                                                    • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: free
                                                                                    • String ID:
                                                                                    • API String ID: 1294909896-0
                                                                                    • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                    • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                    • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                    • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                    APIs
                                                                                      • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                      • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                      • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                      • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                    • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                    • String ID:
                                                                                    • API String ID: 2154303073-0
                                                                                    • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                    • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                    • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                    • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                    APIs
                                                                                      • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                    • String ID:
                                                                                    • API String ID: 3150196962-0
                                                                                    • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                    • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                    • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                    • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                    APIs
                                                                                    • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$PointerRead
                                                                                    • String ID:
                                                                                    • API String ID: 3154509469-0
                                                                                    • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                    • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                    • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                    • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                    APIs
                                                                                    • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                      • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                      • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                      • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                    • String ID:
                                                                                    • API String ID: 4232544981-0
                                                                                    • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                    • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                    • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                    • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                    APIs
                                                                                    • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID:
                                                                                    • API String ID: 3664257935-0
                                                                                    • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                    • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                    • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                    • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                    APIs
                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                    • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$FileModuleName
                                                                                    • String ID:
                                                                                    • API String ID: 3859505661-0
                                                                                    • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                    • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                    • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                    • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                    APIs
                                                                                    • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileRead
                                                                                    • String ID:
                                                                                    • API String ID: 2738559852-0
                                                                                    • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                    • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                    • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                    • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                    APIs
                                                                                    • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3934441357-0
                                                                                    • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                    • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                    • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                    • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                    APIs
                                                                                    • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID:
                                                                                    • API String ID: 3664257935-0
                                                                                    • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                    • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                    • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                    • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                    • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                    • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                    • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                    APIs
                                                                                    • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                    • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                    • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                    • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@
                                                                                    • String ID:
                                                                                    • API String ID: 613200358-0
                                                                                    • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                    • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                    • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                    • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                    APIs
                                                                                    • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID:
                                                                                    • API String ID: 3664257935-0
                                                                                    • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                    • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                    • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                    • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                    APIs
                                                                                    • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnumNamesResource
                                                                                    • String ID:
                                                                                    • API String ID: 3334572018-0
                                                                                    • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                    • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                    • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                    • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                    APIs
                                                                                    • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID:
                                                                                    • API String ID: 3664257935-0
                                                                                    • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                    • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                    • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                    • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                    APIs
                                                                                    • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseFind
                                                                                    • String ID:
                                                                                    • API String ID: 1863332320-0
                                                                                    • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                    • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                    • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                    • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                    APIs
                                                                                    • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Open
                                                                                    • String ID:
                                                                                    • API String ID: 71445658-0
                                                                                    • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                    • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                    • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                    • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                    APIs
                                                                                    • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                    • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                    • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                    • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                    • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                    • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                                                    • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 004095FC
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                      • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                      • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                      • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                    • String ID:
                                                                                    • API String ID: 3655998216-0
                                                                                    • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                    • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                    • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                    • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00445426
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                    • String ID:
                                                                                    • API String ID: 1828521557-0
                                                                                    • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                    • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                    • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                    • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                    APIs
                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                      • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                    • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@FilePointermemcpy
                                                                                    • String ID:
                                                                                    • API String ID: 609303285-0
                                                                                    • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                    • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                    • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                    • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmp
                                                                                    • String ID:
                                                                                    • API String ID: 2081463915-0
                                                                                    • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                    • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                    • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                    • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                    APIs
                                                                                      • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                    • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CloseCreateErrorHandleLastRead
                                                                                    • String ID:
                                                                                    • API String ID: 2136311172-0
                                                                                    • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                    • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                    • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                    • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                    APIs
                                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@??3@
                                                                                    • String ID:
                                                                                    • API String ID: 1936579350-0
                                                                                    • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                    • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                    • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                    • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: free
                                                                                    • String ID:
                                                                                    • API String ID: 1294909896-0
                                                                                    • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                    • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                    • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                    • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: free
                                                                                    • String ID:
                                                                                    • API String ID: 1294909896-0
                                                                                    • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                    • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                    • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                    • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                    APIs
                                                                                    • EmptyClipboard.USER32 ref: 004098EC
                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                    • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                    • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                    • GetLastError.KERNEL32 ref: 0040995D
                                                                                    • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                    • GetLastError.KERNEL32 ref: 00409974
                                                                                    • CloseClipboard.USER32 ref: 0040997D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                    • String ID:
                                                                                    • API String ID: 3604893535-0
                                                                                    • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                    • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                    • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                    • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                    APIs
                                                                                    • EmptyClipboard.USER32 ref: 00409882
                                                                                    • wcslen.MSVCRT ref: 0040988F
                                                                                    • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                    • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                    • CloseClipboard.USER32 ref: 004098D7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                    • String ID:
                                                                                    • API String ID: 1213725291-0
                                                                                    • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                    • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                    • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                    • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32 ref: 004182D7
                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                    • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                    • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                    • LocalFree.KERNEL32(?), ref: 00418342
                                                                                    • free.MSVCRT ref: 00418370
                                                                                      • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                                                      • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                    • String ID: OsError 0x%x (%u)
                                                                                    • API String ID: 2360000266-2664311388
                                                                                    • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                    • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                    • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                    • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                    APIs
                                                                                    • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Version
                                                                                    • String ID:
                                                                                    • API String ID: 1889659487-0
                                                                                    • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                    • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                    • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                    • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                    APIs
                                                                                    • _wcsicmp.MSVCRT ref: 004022A6
                                                                                    • _wcsicmp.MSVCRT ref: 004022D7
                                                                                    • _wcsicmp.MSVCRT ref: 00402305
                                                                                    • _wcsicmp.MSVCRT ref: 00402333
                                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                    • memset.MSVCRT ref: 0040265F
                                                                                    • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                    • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                    • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                                    • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                    • API String ID: 577499730-1134094380
                                                                                    • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                    • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                    • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                    • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                    • String ID: :stringdata$ftp://$http://$https://
                                                                                    • API String ID: 2787044678-1921111777
                                                                                    • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                    • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                    • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                    • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                    • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                    • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                    • GetDC.USER32 ref: 004140E3
                                                                                    • wcslen.MSVCRT ref: 00414123
                                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                    • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                    • _snwprintf.MSVCRT ref: 00414244
                                                                                    • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                    • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                    • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                    • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                    • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                    • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                    • String ID: %s:$EDIT$STATIC
                                                                                    • API String ID: 2080319088-3046471546
                                                                                    • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                    • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                    • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                    • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                    APIs
                                                                                    • EndDialog.USER32(?,?), ref: 00413221
                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                    • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                    • memset.MSVCRT ref: 00413292
                                                                                    • memset.MSVCRT ref: 004132B4
                                                                                    • memset.MSVCRT ref: 004132CD
                                                                                    • memset.MSVCRT ref: 004132E1
                                                                                    • memset.MSVCRT ref: 004132FB
                                                                                    • memset.MSVCRT ref: 00413310
                                                                                    • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                    • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                    • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                    • memset.MSVCRT ref: 004133C0
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                    • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                    • wcscpy.MSVCRT ref: 0041341F
                                                                                    • _snwprintf.MSVCRT ref: 0041348E
                                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                    • SetFocus.USER32(00000000), ref: 004134B7
                                                                                    Strings
                                                                                    • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                    • {Unknown}, xrefs: 004132A6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                    • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                    • API String ID: 4111938811-1819279800
                                                                                    • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                    • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                    • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                    • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                    • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                    • EndDialog.USER32(?,?), ref: 0040135E
                                                                                    • DeleteObject.GDI32(?), ref: 0040136A
                                                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                    • ShowWindow.USER32(00000000), ref: 00401398
                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                    • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                    • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                    • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                    • String ID:
                                                                                    • API String ID: 829165378-0
                                                                                    • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                    • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                    • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                    • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00404172
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                    • wcscpy.MSVCRT ref: 004041D6
                                                                                    • wcscpy.MSVCRT ref: 004041E7
                                                                                    • memset.MSVCRT ref: 00404200
                                                                                    • memset.MSVCRT ref: 00404215
                                                                                    • _snwprintf.MSVCRT ref: 0040422F
                                                                                    • wcscpy.MSVCRT ref: 00404242
                                                                                    • memset.MSVCRT ref: 0040426E
                                                                                    • memset.MSVCRT ref: 004042CD
                                                                                    • memset.MSVCRT ref: 004042E2
                                                                                    • _snwprintf.MSVCRT ref: 004042FE
                                                                                    • wcscpy.MSVCRT ref: 00404311
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                    • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                    • API String ID: 2454223109-1580313836
                                                                                    • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                    • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                    • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                    • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                    APIs
                                                                                      • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                    • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                    • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                    • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                    • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                    • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                    • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                    • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                    • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                    • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                    • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                    • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                      • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                      • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                    • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                    • API String ID: 4054529287-3175352466
                                                                                    • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                    • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                    • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                    • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                    • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                    • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                    • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                    • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                    • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                    • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                    • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                    • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule
                                                                                    • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                    • API String ID: 667068680-2887671607
                                                                                    • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                    • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                    • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                    • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                    • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                    • API String ID: 1607361635-601624466
                                                                                    • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                    • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                    • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                    • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _snwprintf$memset$wcscpy
                                                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                    • API String ID: 2000436516-3842416460
                                                                                    • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                    • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                    • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                    • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                    APIs
                                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                      • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                      • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                      • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                    • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                    • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                    • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                    • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                    • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                    • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                    • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                    • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                    • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                    • String ID:
                                                                                    • API String ID: 1043902810-0
                                                                                    • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                    • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                    • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                    • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                    APIs
                                                                                    • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                    • _snwprintf.MSVCRT ref: 0044488A
                                                                                    • wcscpy.MSVCRT ref: 004448B4
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@??3@_snwprintfwcscpy
                                                                                    • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                    • API String ID: 2899246560-1542517562
                                                                                    • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                                                    • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                    • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                                                    • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040DBCD
                                                                                    • memset.MSVCRT ref: 0040DBE9
                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                      • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                      • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                      • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                    • wcscpy.MSVCRT ref: 0040DC2D
                                                                                    • wcscpy.MSVCRT ref: 0040DC3C
                                                                                    • wcscpy.MSVCRT ref: 0040DC4C
                                                                                    • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                                                    • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                                                    • wcscpy.MSVCRT ref: 0040DCC3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                    • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                    • API String ID: 3330709923-517860148
                                                                                    • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                    • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                    • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                    • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                    APIs
                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                    • memset.MSVCRT ref: 004085CF
                                                                                    • memset.MSVCRT ref: 004085F1
                                                                                    • memset.MSVCRT ref: 00408606
                                                                                    • strcmp.MSVCRT ref: 00408645
                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                    • memset.MSVCRT ref: 0040870E
                                                                                    • strcmp.MSVCRT ref: 0040876B
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                    • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                    • String ID: ---
                                                                                    • API String ID: 3437578500-2854292027
                                                                                    • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                    • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                    • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                    • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0041087D
                                                                                    • memset.MSVCRT ref: 00410892
                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                    • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                    • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                    • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                    • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                    • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                    • DeleteObject.GDI32(?), ref: 004109D0
                                                                                    • DeleteObject.GDI32(?), ref: 004109D6
                                                                                    • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                    • String ID:
                                                                                    • API String ID: 1010922700-0
                                                                                    • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                    • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                    • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                    • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                    APIs
                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                    • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                    • malloc.MSVCRT ref: 004186B7
                                                                                    • free.MSVCRT ref: 004186C7
                                                                                    • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                    • free.MSVCRT ref: 004186E0
                                                                                    • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                    • malloc.MSVCRT ref: 004186FE
                                                                                    • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                    • free.MSVCRT ref: 00418716
                                                                                    • free.MSVCRT ref: 0041872A
                                                                                    • free.MSVCRT ref: 00418749
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: free$FullNamePath$malloc$Version
                                                                                    • String ID: |A
                                                                                    • API String ID: 3356672799-1717621600
                                                                                    • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                    • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                    • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                    • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmp
                                                                                    • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                    • API String ID: 2081463915-1959339147
                                                                                    • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                    • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                    • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                    • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                    APIs
                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                    • API String ID: 2012295524-70141382
                                                                                    • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                    • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                    • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                    • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                    • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                    • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule
                                                                                    • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                    • API String ID: 667068680-3953557276
                                                                                    • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                    • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                    • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                    • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 004121FF
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                    • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                    • SelectObject.GDI32(?,?), ref: 00412251
                                                                                    • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                    • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                      • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                      • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                      • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                    • SetCursor.USER32(00000000), ref: 004122BC
                                                                                    • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                    • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                    • String ID:
                                                                                    • API String ID: 1700100422-0
                                                                                    • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                    • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                    • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                    • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                    APIs
                                                                                    • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                    • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                    • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                    • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                    • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                    • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                    • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                    • String ID:
                                                                                    • API String ID: 552707033-0
                                                                                    • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                    • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                    • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                    • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                      • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                      • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                    • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                    • strchr.MSVCRT ref: 0040C140
                                                                                    • strchr.MSVCRT ref: 0040C151
                                                                                    • _strlwr.MSVCRT ref: 0040C15F
                                                                                    • memset.MSVCRT ref: 0040C17A
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                    • String ID: 4$h
                                                                                    • API String ID: 4066021378-1856150674
                                                                                    • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                    • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                    • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                    • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$_snwprintf
                                                                                    • String ID: %%0.%df
                                                                                    • API String ID: 3473751417-763548558
                                                                                    • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                    • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                    • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                    • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                    APIs
                                                                                    • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                    • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                    • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                    • GetTickCount.KERNEL32 ref: 0040610B
                                                                                    • GetParent.USER32(?), ref: 00406136
                                                                                    • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                    • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                    • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                    • String ID: A
                                                                                    • API String ID: 2892645895-3554254475
                                                                                    • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                    • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                    • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                    • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                    APIs
                                                                                    • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                      • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                      • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                      • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                      • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                    • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                    • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                    • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                    • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                    • memset.MSVCRT ref: 0040DA23
                                                                                    • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                    • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                    • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                      • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                    • String ID: caption
                                                                                    • API String ID: 973020956-4135340389
                                                                                    • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                    • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                    • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                    • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                    APIs
                                                                                    Strings
                                                                                    • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                    • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                    • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                    • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$_snwprintf$wcscpy
                                                                                    • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                    • API String ID: 1283228442-2366825230
                                                                                    • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                    • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                    • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                    • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                    APIs
                                                                                    • wcschr.MSVCRT ref: 00413972
                                                                                    • wcscpy.MSVCRT ref: 00413982
                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                    • wcscpy.MSVCRT ref: 004139D1
                                                                                    • wcscat.MSVCRT ref: 004139DC
                                                                                    • memset.MSVCRT ref: 004139B8
                                                                                      • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                      • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                    • memset.MSVCRT ref: 00413A00
                                                                                    • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                    • wcscat.MSVCRT ref: 00413A27
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                    • String ID: \systemroot
                                                                                    • API String ID: 4173585201-1821301763
                                                                                    • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                    • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                    • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                    • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcscpy
                                                                                    • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                    • API String ID: 1284135714-318151290
                                                                                    • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                    • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                    • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                    • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                    • String ID: 0$6
                                                                                    • API String ID: 4066108131-3849865405
                                                                                    • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                    • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                    • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                    • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 004082EF
                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                    • memset.MSVCRT ref: 00408362
                                                                                    • memset.MSVCRT ref: 00408377
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$ByteCharMultiWide
                                                                                    • String ID:
                                                                                    • API String ID: 290601579-0
                                                                                    • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                    • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                    • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                    • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: free$wcslen
                                                                                    • String ID:
                                                                                    • API String ID: 3592753638-3916222277
                                                                                    • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                    • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                    • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                    • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040A47B
                                                                                    • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                    • wcslen.MSVCRT ref: 0040A4BA
                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                    • wcslen.MSVCRT ref: 0040A4E0
                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpywcslen$_snwprintfmemset
                                                                                    • String ID: %s (%s)$YV@
                                                                                    • API String ID: 3979103747-598926743
                                                                                    • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                    • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                    • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                    • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                    APIs
                                                                                    • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                    • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeLoadMessageProc
                                                                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                    • API String ID: 2780580303-317687271
                                                                                    • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                    • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                    • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                    • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                    • wcslen.MSVCRT ref: 0040A6B1
                                                                                    • wcscpy.MSVCRT ref: 0040A6C1
                                                                                    • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                    • wcscpy.MSVCRT ref: 0040A6DB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                    • String ID: Unknown Error$netmsg.dll
                                                                                    • API String ID: 2767993716-572158859
                                                                                    • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                    • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                    • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                    • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                    APIs
                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                    • wcscpy.MSVCRT ref: 0040DAFB
                                                                                    • wcscpy.MSVCRT ref: 0040DB0B
                                                                                    • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                      • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                    • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                    • API String ID: 3176057301-2039793938
                                                                                    • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                    • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                    • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                    • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                    APIs
                                                                                    Strings
                                                                                    • too many attached databases - max %d, xrefs: 0042F64D
                                                                                    • database %s is already in use, xrefs: 0042F6C5
                                                                                    • database is already attached, xrefs: 0042F721
                                                                                    • unable to open database: %s, xrefs: 0042F84E
                                                                                    • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                    • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                    • out of memory, xrefs: 0042F865
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpymemset
                                                                                    • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                    • API String ID: 1297977491-2001300268
                                                                                    • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                    • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                    • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                    • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                    APIs
                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                                                                                    • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                                                                                    • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                    • String ID: ($d
                                                                                    • API String ID: 1140211610-1915259565
                                                                                    • Opcode ID: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                                                                    • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                    • Opcode Fuzzy Hash: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                                                                    • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                    APIs
                                                                                    • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                    • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                    • GetLastError.KERNEL32 ref: 004178FB
                                                                                    • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$ErrorLastLockSleepUnlock
                                                                                    • String ID:
                                                                                    • API String ID: 3015003838-0
                                                                                    • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                    • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                    • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                    • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                    APIs
                                                                                    • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                                    • GetLastError.KERNEL32 ref: 0041855C
                                                                                    • Sleep.KERNEL32(00000064), ref: 00418571
                                                                                    • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                                    • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                                    • GetLastError.KERNEL32 ref: 0041858E
                                                                                    • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                                    • free.MSVCRT ref: 004185AC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                                    • String ID:
                                                                                    • API String ID: 2802642348-0
                                                                                    • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                    • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                    • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                    • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                    APIs
                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                                                    • memset.MSVCRT ref: 00413ADC
                                                                                    • memset.MSVCRT ref: 00413AEC
                                                                                      • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                    • memset.MSVCRT ref: 00413BD7
                                                                                    • wcscpy.MSVCRT ref: 00413BF8
                                                                                    • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                    • String ID: 3A
                                                                                    • API String ID: 3300951397-293699754
                                                                                    • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                    • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                    • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                    • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                    • wcscpy.MSVCRT ref: 0040D1B5
                                                                                      • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                      • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                    • wcslen.MSVCRT ref: 0040D1D3
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                    • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                    • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                    • String ID: strings
                                                                                    • API String ID: 3166385802-3030018805
                                                                                    • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                    • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                    • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                    • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00411AF6
                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                    • wcsrchr.MSVCRT ref: 00411B14
                                                                                    • wcscat.MSVCRT ref: 00411B2E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                    • String ID: AE$.cfg$General$EA
                                                                                    • API String ID: 776488737-1622828088
                                                                                    • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                    • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                    • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                    • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040D8BD
                                                                                    • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                    • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                    • memset.MSVCRT ref: 0040D906
                                                                                    • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                    • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                      • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                      • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                    • String ID: sysdatetimepick32
                                                                                    • API String ID: 1028950076-4169760276
                                                                                    • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                    • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                    • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                    • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                    APIs
                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                    • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                    • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                    • memset.MSVCRT ref: 0041BA3D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy$memset
                                                                                    • String ID: -journal$-wal
                                                                                    • API String ID: 438689982-2894717839
                                                                                    • Opcode ID: dbb6fae49c61f74d6f433767b436fbd9ec9999f6e4b570cef93805d1319e1532
                                                                                    • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                    • Opcode Fuzzy Hash: dbb6fae49c61f74d6f433767b436fbd9ec9999f6e4b570cef93805d1319e1532
                                                                                    • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                    • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                    • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                      • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                      • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                    • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                    • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Item$Dialog$MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3975816621-0
                                                                                    • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                    • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                    • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                    • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                    APIs
                                                                                    • _wcsicmp.MSVCRT ref: 00444D09
                                                                                    • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                    • _wcsicmp.MSVCRT ref: 00444D33
                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmp$wcslen$_memicmp
                                                                                    • String ID: .save$http://$https://$log profile$signIn
                                                                                    • API String ID: 1214746602-2708368587
                                                                                    • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                    • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                    • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                    • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                    APIs
                                                                                    • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                    • GetTickCount.KERNEL32 ref: 0041887D
                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                    • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                    • String ID:
                                                                                    • API String ID: 4218492932-0
                                                                                    • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                    • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                    • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                    • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                    APIs
                                                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                    • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                    • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                    • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                    • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy$memset
                                                                                    • String ID: gj
                                                                                    • API String ID: 438689982-4203073231
                                                                                    • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                    • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                    • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                    • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                    APIs
                                                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy
                                                                                    • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                    • API String ID: 3510742995-2446657581
                                                                                    • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                    • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                    • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                    • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                    • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                    • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                    • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                    • memset.MSVCRT ref: 00405ABB
                                                                                    • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                    • SetFocus.USER32(?), ref: 00405B76
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$FocusItemmemset
                                                                                    • String ID:
                                                                                    • API String ID: 4281309102-0
                                                                                    • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                    • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                    • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                    • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _snwprintfwcscat
                                                                                    • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                    • API String ID: 384018552-4153097237
                                                                                    • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                    • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                    • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                    • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                    • String ID: 0$6
                                                                                    • API String ID: 2029023288-3849865405
                                                                                    • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                    • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                    • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                    • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                    APIs
                                                                                      • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                    • memset.MSVCRT ref: 00405455
                                                                                    • memset.MSVCRT ref: 0040546C
                                                                                    • memset.MSVCRT ref: 00405483
                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$memcpy$ErrorLast
                                                                                    • String ID: 6$\
                                                                                    • API String ID: 404372293-1284684873
                                                                                    • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                    • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                    • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                    • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                    APIs
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                    • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                    • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                    • wcscpy.MSVCRT ref: 0040A0D9
                                                                                    • wcscat.MSVCRT ref: 0040A0E6
                                                                                    • wcscat.MSVCRT ref: 0040A0F5
                                                                                    • wcscpy.MSVCRT ref: 0040A107
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                    • String ID:
                                                                                    • API String ID: 1331804452-0
                                                                                    • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                    • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                    • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                    • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                    APIs
                                                                                      • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                    • String ID: advapi32.dll
                                                                                    • API String ID: 2012295524-4050573280
                                                                                    • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                    • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                    • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                    • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                    APIs
                                                                                    Strings
                                                                                    • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                    • <%s>, xrefs: 004100A6
                                                                                    • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$_snwprintf
                                                                                    • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                    • API String ID: 3473751417-2880344631
                                                                                    • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                    • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                    • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                    • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcscat$_snwprintfmemset
                                                                                    • String ID: %2.2X
                                                                                    • API String ID: 2521778956-791839006
                                                                                    • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                    • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                    • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                    • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _snwprintfwcscpy
                                                                                    • String ID: dialog_%d$general$menu_%d$strings
                                                                                    • API String ID: 999028693-502967061
                                                                                    • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                    • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                    • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                    • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                    APIs
                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                      • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                      • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                    • memset.MSVCRT ref: 0040C439
                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                    • _wcsupr.MSVCRT ref: 0040C481
                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                    • memset.MSVCRT ref: 0040C4D0
                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                    • String ID:
                                                                                    • API String ID: 4131475296-0
                                                                                    • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                                    • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                    • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                                    • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 004116FF
                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                      • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                    • API String ID: 2618321458-3614832568
                                                                                    • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                    • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                    • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                    • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFilefreememset
                                                                                    • String ID:
                                                                                    • API String ID: 2507021081-0
                                                                                    • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                    • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                    • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                    • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                    APIs
                                                                                    • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                    • malloc.MSVCRT ref: 00417524
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                    • free.MSVCRT ref: 00417544
                                                                                    • free.MSVCRT ref: 00417562
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                    • String ID:
                                                                                    • API String ID: 4131324427-0
                                                                                    • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                    • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                    • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                    • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                    APIs
                                                                                    • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                    • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                    • free.MSVCRT ref: 0041822B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: PathTemp$free
                                                                                    • String ID: %s\etilqs_$etilqs_
                                                                                    • API String ID: 924794160-1420421710
                                                                                    • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                    • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                    • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                    • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                    APIs
                                                                                    • wcscpy.MSVCRT ref: 0041477F
                                                                                    • wcscpy.MSVCRT ref: 0041479A
                                                                                    • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcscpy$CloseCreateFileHandle
                                                                                    • String ID: General
                                                                                    • API String ID: 999786162-26480598
                                                                                    • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                    • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                    • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                    • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastMessage_snwprintf
                                                                                    • String ID: Error$Error %d: %s
                                                                                    • API String ID: 313946961-1552265934
                                                                                    • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                    • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                    • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                    • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: foreign key constraint failed$new$oid$old
                                                                                    • API String ID: 0-1953309616
                                                                                    • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                    • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                    • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                    • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                    APIs
                                                                                    Strings
                                                                                    • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                    • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                    • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy
                                                                                    • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                    • API String ID: 3510742995-272990098
                                                                                    • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                    • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                    • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                    • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0044A6EB
                                                                                    • memset.MSVCRT ref: 0044A6FB
                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpymemset
                                                                                    • String ID: gj
                                                                                    • API String ID: 1297977491-4203073231
                                                                                    • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                    • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                    • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                    • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                    APIs
                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                                    • free.MSVCRT ref: 0040E9D3
                                                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$free
                                                                                    • String ID:
                                                                                    • API String ID: 2241099983-0
                                                                                    • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                    • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                    • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                    • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                    APIs
                                                                                    • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                    • malloc.MSVCRT ref: 004174BD
                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                    • free.MSVCRT ref: 004174E4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                    • String ID:
                                                                                    • API String ID: 4053608372-0
                                                                                    • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                    • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                    • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                    • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                    APIs
                                                                                    • GetParent.USER32(?), ref: 0040D453
                                                                                    • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                    • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Rect$ClientParentPoints
                                                                                    • String ID:
                                                                                    • API String ID: 4247780290-0
                                                                                    • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                    • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                    • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                    • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                    APIs
                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                    • memset.MSVCRT ref: 004450CD
                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                      • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                    • String ID:
                                                                                    • API String ID: 1471605966-0
                                                                                    • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                    • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                    • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                    • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                    APIs
                                                                                    • wcscpy.MSVCRT ref: 0044475F
                                                                                    • wcscat.MSVCRT ref: 0044476E
                                                                                    • wcscat.MSVCRT ref: 0044477F
                                                                                    • wcscat.MSVCRT ref: 0044478E
                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                      • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                      • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                    • String ID: \StringFileInfo\
                                                                                    • API String ID: 102104167-2245444037
                                                                                    • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                    • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                    • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                    • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                    APIs
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@
                                                                                    • String ID:
                                                                                    • API String ID: 613200358-0
                                                                                    • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                    • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                    • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                    • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _memicmpwcslen
                                                                                    • String ID: @@@@$History
                                                                                    • API String ID: 1872909662-685208920
                                                                                    • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                    • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                    • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                    • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 004100FB
                                                                                    • memset.MSVCRT ref: 00410112
                                                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                    • _snwprintf.MSVCRT ref: 00410141
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                    • String ID: </%s>
                                                                                    • API String ID: 3400436232-259020660
                                                                                    • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                    • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                    • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                    • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040D58D
                                                                                    • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                    • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ChildEnumTextWindowWindowsmemset
                                                                                    • String ID: caption
                                                                                    • API String ID: 1523050162-4135340389
                                                                                    • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                    • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                    • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                    • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                    APIs
                                                                                      • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                      • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                    • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                    • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                    • String ID: MS Sans Serif
                                                                                    • API String ID: 210187428-168460110
                                                                                    • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                    • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                    • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                    • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                    APIs
                                                                                    • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                    • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                    • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                    • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                    • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy$memcmp
                                                                                    • String ID:
                                                                                    • API String ID: 3384217055-0
                                                                                    • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                    • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                    • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                    • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$memcpy
                                                                                    • String ID:
                                                                                    • API String ID: 368790112-0
                                                                                    • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                    • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                    • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                    • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                    APIs
                                                                                      • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                    • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                    Strings
                                                                                    • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                    • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                    • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpymemset
                                                                                    • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                    • API String ID: 1297977491-2063813899
                                                                                    • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                    • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                    • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                    • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040560C
                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                      • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                    • String ID: *.*$dat$wand.dat
                                                                                    • API String ID: 2618321458-1828844352
                                                                                    • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                    • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                    • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                    • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                    APIs
                                                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                    • wcslen.MSVCRT ref: 00410C74
                                                                                    • _wtoi.MSVCRT(?), ref: 00410C80
                                                                                    • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                    • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                    • String ID:
                                                                                    • API String ID: 1549203181-0
                                                                                    • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                    • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                    • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                    • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00412057
                                                                                      • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                    • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                    • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                    • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                    • String ID:
                                                                                    • API String ID: 3550944819-0
                                                                                    • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                    • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                    • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                    • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                    APIs
                                                                                    • free.MSVCRT ref: 0040F561
                                                                                    • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                    • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy$free
                                                                                    • String ID: g4@
                                                                                    • API String ID: 2888793982-2133833424
                                                                                    • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                    • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                    • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                    • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                    APIs
                                                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                    • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy
                                                                                    • String ID: @
                                                                                    • API String ID: 3510742995-2766056989
                                                                                    • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                    • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                    • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                    • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 004144E7
                                                                                      • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                      • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                    • memset.MSVCRT ref: 0041451A
                                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                    • String ID:
                                                                                    • API String ID: 1127616056-0
                                                                                    • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                    • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                    • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                    • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                    APIs
                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,74DEDF80,?,0041755F,?), ref: 00417452
                                                                                    • malloc.MSVCRT ref: 00417459
                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,74DEDF80,?,0041755F,?), ref: 00417478
                                                                                    • free.MSVCRT ref: 0041747F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$freemalloc
                                                                                    • String ID:
                                                                                    • API String ID: 2605342592-0
                                                                                    • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                    • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                    • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                    • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                    • RegisterClassW.USER32(?), ref: 00412428
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                    • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                    • String ID:
                                                                                    • API String ID: 2678498856-0
                                                                                    • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                    • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                    • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                    • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                    APIs
                                                                                    • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                    • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                    • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                    • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Item
                                                                                    • String ID:
                                                                                    • API String ID: 3888421826-0
                                                                                    • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                    • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                    • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                    • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00417B7B
                                                                                    • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                    • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                    • GetLastError.KERNEL32 ref: 00417BB5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$ErrorLastLockUnlockmemset
                                                                                    • String ID:
                                                                                    • API String ID: 3727323765-0
                                                                                    • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                    • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                    • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                    • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040F673
                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                    • strlen.MSVCRT ref: 0040F6A2
                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 2754987064-0
                                                                                    • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                    • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                    • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                    • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040F6E2
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                    • strlen.MSVCRT ref: 0040F70D
                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 2754987064-0
                                                                                    • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                    • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                    • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                    • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                    APIs
                                                                                      • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                      • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                      • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                    • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                    • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                    • String ID:
                                                                                    • API String ID: 764393265-0
                                                                                    • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                    • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                    • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                    • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                    APIs
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$System$File$LocalSpecific
                                                                                    • String ID:
                                                                                    • API String ID: 979780441-0
                                                                                    • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                    • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                    • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                    • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                    APIs
                                                                                    • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                    • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                    • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy$DialogHandleModuleParam
                                                                                    • String ID:
                                                                                    • API String ID: 1386444988-0
                                                                                    • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                    • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                    • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                    • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                    APIs
                                                                                    • wcschr.MSVCRT ref: 0040F79E
                                                                                    • wcschr.MSVCRT ref: 0040F7AC
                                                                                      • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                      • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcschr$memcpywcslen
                                                                                    • String ID: "
                                                                                    • API String ID: 1983396471-123907689
                                                                                    • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                    • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                    • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                    • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                    APIs
                                                                                    • _snwprintf.MSVCRT ref: 0040A398
                                                                                    • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _snwprintfmemcpy
                                                                                    • String ID: %2.2X
                                                                                    • API String ID: 2789212964-323797159
                                                                                    • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                    • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                    • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                    • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: _snwprintf
                                                                                    • String ID: %%-%d.%ds
                                                                                    • API String ID: 3988819677-2008345750
                                                                                    • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                    • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                    • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                    • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 0040E770
                                                                                    • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendmemset
                                                                                    • String ID: F^@
                                                                                    • API String ID: 568519121-3652327722
                                                                                    • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                    • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                    • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                    • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: PlacementWindowmemset
                                                                                    • String ID: WinPos
                                                                                    • API String ID: 4036792311-2823255486
                                                                                    • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                    • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                    • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                    • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                    APIs
                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                    • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                    • wcscat.MSVCRT ref: 0040DCFF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileModuleNamewcscatwcsrchr
                                                                                    • String ID: _lng.ini
                                                                                    • API String ID: 383090722-1948609170
                                                                                    • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                    • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                    • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                    • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                    APIs
                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                    • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                    • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                    • API String ID: 2773794195-880857682
                                                                                    • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                    • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                    • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                    • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                    APIs
                                                                                    • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                    • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                    • memset.MSVCRT ref: 0042BAAE
                                                                                    • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcpy$memset
                                                                                    • String ID:
                                                                                    • API String ID: 438689982-0
                                                                                    • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                    • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                    • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                    • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                    APIs
                                                                                      • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@$memset
                                                                                    • String ID:
                                                                                    • API String ID: 1860491036-0
                                                                                    • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                    • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                    • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                    • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                    APIs
                                                                                    • wcslen.MSVCRT ref: 0040A8E2
                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                    • free.MSVCRT ref: 0040A908
                                                                                    • free.MSVCRT ref: 0040A92B
                                                                                    • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: free$memcpy$mallocwcslen
                                                                                    • String ID:
                                                                                    • API String ID: 726966127-0
                                                                                    • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                    • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                    • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                    • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                    APIs
                                                                                    • wcslen.MSVCRT ref: 0040B1DE
                                                                                    • free.MSVCRT ref: 0040B201
                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                    • free.MSVCRT ref: 0040B224
                                                                                    • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: free$memcpy$mallocwcslen
                                                                                    • String ID:
                                                                                    • API String ID: 726966127-0
                                                                                    • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                    • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                    • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                    • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                    APIs
                                                                                    • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                      • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                      • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                      • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                    • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                    • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                    • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcmp$memcpy
                                                                                    • String ID:
                                                                                    • API String ID: 231171946-0
                                                                                    • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                    • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                    • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                    • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                    APIs
                                                                                    • strlen.MSVCRT ref: 0040B0D8
                                                                                    • free.MSVCRT ref: 0040B0FB
                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                    • free.MSVCRT ref: 0040B12C
                                                                                    • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: free$memcpy$mallocstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 3669619086-0
                                                                                    • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                    • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                    • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                    • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                    • malloc.MSVCRT ref: 00417407
                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                    • free.MSVCRT ref: 00417425
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.1710381527.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$freemalloc
                                                                                    • String ID:
                                                                                    • API String ID: 2605342592-0
                                                                                    • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                    • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                    • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                    • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5