Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
eiQXaKJ75nCjEWn.exe

Overview

General Information

Sample name:eiQXaKJ75nCjEWn.exe
Analysis ID:1436310
MD5:3fee7d5c6b2adb59a462e7f51004c8ec
SHA1:a541bfc296bf972506fb4400f0199edc39b144ee
SHA256:268c36f27645590a64c285888fa50d84b06183a27f4c92d598f269790286253a
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • eiQXaKJ75nCjEWn.exe (PID: 1660 cmdline: "C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exe" MD5: 3FEE7D5C6B2ADB59A462E7F51004C8EC)
    • MSBuild.exe (PID: 7228 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 7240 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 7252 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 7260 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.pu.edu.af", "Username": "saif.rohi@pu.edu.af", "Password": "Ro#@.com55"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2460001262.0000000002E18000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.1256118946.0000000005620000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.2457876950.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000005.00000002.2457876950.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            0.2.eiQXaKJ75nCjEWn.exe.2e17440.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.eiQXaKJ75nCjEWn.exe.5620000.10.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.eiQXaKJ75nCjEWn.exe.2e067c8.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.eiQXaKJ75nCjEWn.exe.5620000.10.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.eiQXaKJ75nCjEWn.exe.2e067c8.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Click to see the 22 entries

                      Networking

                      barindex
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.132.98.224, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 7260, Protocol: tcp, SourceIp: 192.168.2.10, SourceIsIpv6: false, SourcePort: 49706
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.pu.edu.af", "Username": "saif.rohi@pu.edu.af", "Password": "Ro#@.com55"}
                      Source: eiQXaKJ75nCjEWn.exeReversingLabs: Detection: 52%
                      Source: eiQXaKJ75nCjEWn.exeVirustotal: Detection: 48%Perma Link
                      Source: eiQXaKJ75nCjEWn.exeJoe Sandbox ML: detected
                      Source: eiQXaKJ75nCjEWn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 173.222.162.55:443 -> 192.168.2.10:49709 version: TLS 1.2
                      Source: eiQXaKJ75nCjEWn.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 4x nop then jmp 05FDBD9Dh0_2_05FDC1AB

                      Networking

                      barindex
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.raw.unpack, type: UNPACKEDPE
                      Source: global trafficTCP traffic: 192.168.2.10:49706 -> 103.132.98.224:587
                      Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
                      Source: global trafficTCP traffic: 192.168.2.10:49706 -> 103.132.98.224:587
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
                      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 20.42.65.85
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.55
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: mail.pu.edu.af
                      Source: MSBuild.exe, 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.pu.edu.af
                      Source: MSBuild.exe, 00000005.00000002.2458821017.0000000000FD6000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2463257536.00000000060CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/03
                      Source: MSBuild.exe, 00000005.00000002.2458821017.0000000000FD6000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2463257536.00000000060CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                      Source: MSBuild.exe, 00000005.00000002.2458821017.0000000000FD6000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2463257536.00000000060CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                      Source: MSBuild.exe, 00000005.00000002.2458821017.0000000000FD6000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2463257536.00000000060CE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                      Source: eiQXaKJ75nCjEWn.exe, 00000000.00000002.1254325811.0000000004A11000.00000004.00000800.00020000.00000000.sdmp, eiQXaKJ75nCjEWn.exe, 00000000.00000002.1254325811.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2457876950.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                      Source: unknownHTTPS traffic detected: 173.222.162.55:443 -> 192.168.2.10:49709 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, lBLTBzkV.cs.Net Code: h9f
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.raw.unpack, lBLTBzkV.cs.Net Code: h9f

                      System Summary

                      barindex
                      Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_02D7EFC40_2_02D7EFC4
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FDDDE00_2_05FDDDE0
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD2FB80_2_05FD2FB8
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD94F80_2_05FD94F8
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD74280_2_05FD7428
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD74230_2_05FD7423
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD90C00_2_05FD90C0
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FDDDD00_2_05FDDDD0
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD2FA80_2_05FD2FA8
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD9EA80_2_05FD9EA8
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD78600_2_05FD7860
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD0BC00_2_05FD0BC0
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD0BB00_2_05FD0BB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_013293705_2_01329370
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_01329BE85_2_01329BE8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_01324A985_2_01324A98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_0132CE705_2_0132CE70
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_01323E805_2_01323E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_013241C85_2_013241C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 5_2_01329BE05_2_01329BE0
                      Source: eiQXaKJ75nCjEWn.exe, 00000000.00000002.1256651109.0000000006330000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs eiQXaKJ75nCjEWn.exe
                      Source: eiQXaKJ75nCjEWn.exe, 00000000.00000002.1255987424.00000000055D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs eiQXaKJ75nCjEWn.exe
                      Source: eiQXaKJ75nCjEWn.exe, 00000000.00000002.1251215999.000000000114E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs eiQXaKJ75nCjEWn.exe
                      Source: eiQXaKJ75nCjEWn.exe, 00000000.00000002.1251727408.0000000002E48000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename0eb1f663-67ab-4af7-95d7-b04526baf746.exe4 vs eiQXaKJ75nCjEWn.exe
                      Source: eiQXaKJ75nCjEWn.exe, 00000000.00000002.1251727408.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dllD vs eiQXaKJ75nCjEWn.exe
                      Source: eiQXaKJ75nCjEWn.exe, 00000000.00000000.1209549596.0000000000B2A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelpPl.exe8 vs eiQXaKJ75nCjEWn.exe
                      Source: eiQXaKJ75nCjEWn.exe, 00000000.00000002.1254325811.00000000040F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename0eb1f663-67ab-4af7-95d7-b04526baf746.exe4 vs eiQXaKJ75nCjEWn.exe
                      Source: eiQXaKJ75nCjEWn.exe, 00000000.00000002.1254325811.00000000040F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs eiQXaKJ75nCjEWn.exe
                      Source: eiQXaKJ75nCjEWn.exeBinary or memory string: OriginalFilenamelpPl.exe8 vs eiQXaKJ75nCjEWn.exe
                      Source: eiQXaKJ75nCjEWn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: eiQXaKJ75nCjEWn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, kGWv.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, 84Zwl.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, Z80kh.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, R7VqEELv.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, iWM.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, tHB.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, YGTyRx.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, YGTyRx.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, YGTyRx.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, YGTyRx.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, Dhu0Eh9wMH2k1sIkgU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, wPgmWqMqnbCNwrUNZG.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, wPgmWqMqnbCNwrUNZG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, wPgmWqMqnbCNwrUNZG.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, Dhu0Eh9wMH2k1sIkgU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, wPgmWqMqnbCNwrUNZG.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, wPgmWqMqnbCNwrUNZG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, wPgmWqMqnbCNwrUNZG.csSecurity API names: _0020.AddAccessRule
                      Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@9/1@1/1
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\eiQXaKJ75nCjEWn.exe.logJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMutant created: \Sessions\1\BaseNamedObjects\OrNPjmzvKIpkAQwBkdxyfhDF
                      Source: eiQXaKJ75nCjEWn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: eiQXaKJ75nCjEWn.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: eiQXaKJ75nCjEWn.exeReversingLabs: Detection: 52%
                      Source: eiQXaKJ75nCjEWn.exeVirustotal: Detection: 48%
                      Source: unknownProcess created: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exe "C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exe"
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: eiQXaKJ75nCjEWn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: eiQXaKJ75nCjEWn.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.5620000.10.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.2e17440.2.raw.unpack, XG.cs.Net Code: Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777298)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777243)),Type.GetTypeFromHandle(global::cO.Ri.k2anMS(16777254))})
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, wPgmWqMqnbCNwrUNZG.cs.Net Code: Y8aS1svGS3 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, wPgmWqMqnbCNwrUNZG.cs.Net Code: Y8aS1svGS3 System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeCode function: 0_2_05FD7418 push eax; iretd 0_2_05FD7421
                      Source: eiQXaKJ75nCjEWn.exeStatic PE information: section name: .text entropy: 7.9724800598562675
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, qDnCwZmwwk5CXau3IU.csHigh entropy of concatenated method names: 'JsgW2qyEji', 'JKoW4D2V94', 'B8JWdv9cHX', 'KB2WKH8SrD', 'RnnWeJ05kD', 'wDjW0efr27', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, wPgmWqMqnbCNwrUNZG.csHigh entropy of concatenated method names: 'vNHRJ3VP1g', 'f2XRkboEpC', 'WnkR8DvHxb', 'tsKRiq6eet', 'EoJR6j8cZv', 'nJDRrvPZIZ', 'bKHRZwy65M', 'ytVRMTn44K', 'A6GRXJiKbn', 'obRRc0mF4R'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, Gpx49TbZyPj2rSfaGq.csHigh entropy of concatenated method names: 'lvIZkhbJeP', 'wvwZircpmf', 'IgIZrRkfCN', 'QCjrvDBXoK', 'OdYrzU1e4c', 'DMKZ7DdUyt', 'a97Zaawx7N', 'XLSZlhyqTV', 'P3BZR2xTXB', 'w77ZStuP3k'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, GmY5cg4l0GFGyWnHMZ.csHigh entropy of concatenated method names: 'RAAjZ8sFBSSU6mTZIoC', 'peHjRDsAjrfU2VE3d4e', 'V5GrWKB6a5', 'nXYrOJhCYx', 'oL1rn3qU8B', 'GLv7sxs1H45nDNn3CMR', 'HldmlksBvLaTbWYnEw0'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, c6dN6MEapJ6S6NyHED.csHigh entropy of concatenated method names: 'tp36tbUXFZ', 'cfl6CTI9HL', 'B4WidvOtvL', 'opDiKMFBTF', 'IHui07KcbO', 'e8oio0fdM0', 'fmqibMXMPX', 'ElWiQDkZHC', 'mtSiVOVfYL', 'tiXixGOdsn'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, FjtX6QAbhgvgoAq3J2.csHigh entropy of concatenated method names: 'eK7WkKSNg8', 'BnDW8Sc0na', 'm7wWiPsfVD', 'ocGW6NCNLO', 'jwCWrt3cip', 'MNxWZM7qY0', 'WkaWMfDSvQ', 'AVBWXQy8sg', 'Hp7WcPnFwh', 'BAVWH2mAUS'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, Dhu0Eh9wMH2k1sIkgU.csHigh entropy of concatenated method names: 'meg8en581P', 'KsE8N2v6uj', 'jMo8BYpIA0', 'EPh8G1Uocc', 'hZq8gAGT4D', 'aQU83qC08n', 'gum8ysDX5m', 'GnQ8Av1OBU', 'axr8mHdbBR', 'PU18v6l0K7'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, XHnqtqaRGtwfMkrPxkr.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rGLneVeiM7', 'EMgnNDSCWf', 'MDwnB4aPd9', 'bn4nGQolok', 'Rp0nggQ3dY', 'Kiun3t5Zuu', 'QAvnyFYuyf'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, rPnV0i51K4A7vit08C.csHigh entropy of concatenated method names: 'cp7s926KGD', 'PegsUnyjXF', 'bVls2xjix0', 'Qu1s42bXJY', 'uGTsKcrIIq', 'KMCs0hbm7Z', 'NAwsbasD9r', 'SYasQq49BT', 'J6ssxloTT3', 'qpgsYVd98P'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, VumYp58i5pFGA82i9r.csHigh entropy of concatenated method names: 'Dispose', 'drAamiVdGf', 'KAJl4fEXrN', 'IgWJJdkvOh', 'iEjavtX6Qb', 'ygvazgoAq3', 'ProcessDialogKey', 'e2Ll7DnCwZ', 'xwkla5CXau', 'VIUllqSlGo'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, kfI8rR3hWYm2Z2Lf6i.csHigh entropy of concatenated method names: 'rPILAygBDo', 'kysLvNM5ic', 'O4tW7Px2Ah', 'JkYWa8OUYC', 'RlILYBqeys', 'KXFLD8OUio', 'x8FL5SNR9d', 'O9SLet2Jre', 'MiULN8cN0g', 'ioXLBDlJHt'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, QpplLSeQ7jQp9Xcomu.csHigh entropy of concatenated method names: 'ligjxT0U0N', 'b8JjDehWic', 'ujRjeQisnE', 'CdyjNrFlDv', 'sDPj4ZVWKS', 'e5yjdbrqrM', 'N4TjKxGKnl', 'INyj08Z8TX', 'CAyjo0FK7F', 'Gurjb6vApm'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, VJrXt4SQQiCCqYHlFQ.csHigh entropy of concatenated method names: 'sX9aZhu0Eh', 'xMHaM2k1sI', 'vTwacg5Yww', 'Hy5aHCR6dN', 'RyHajEDS8q', 'B2KaTo9KXX', 'YOpfU8WnTuqYEpvuLV', 'xnl8u4Yb02ot9dKrnb', 'QhTaa4xQKE', 'gASaR0ZVpi'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, gQoXauUTwg5Ywwdy5C.csHigh entropy of concatenated method names: 'aRuiIJiZq9', 'c3riPlEDdb', 'xWLi905JCb', 'z49iUFgqNm', 'yjlijkvcQk', 'awAiThYUgB', 'MdriLQMrbS', 'zVViWJqIeN', 'SfNiO8EZuk', 'lpninQQAY5'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, o3R9O2zvp9mUFDyVnC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HRIOsvmI24', 'RYvOjc98cd', 'irSOT8mse7', 'aykOLhbLHq', 'JJyOWZsKDh', 'hKlOOn7QtU', 'DNMOnt8QM4'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, P4EHaClHThcWo3JECp.csHigh entropy of concatenated method names: 'iJX1UXaYR', 'Q0yIHbktt', 'NWdPU09Ob', 'Pb7CFDX20', 'D52UrLCRA', 'tmQE0TlE5', 'CNpcrnvGALe5Xusjl6', 'gQAyuhn8VpeAogX4OA', 'fFsW4mhBd', 'O5xnBmj4d'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, UEMvL3a7fTu1ujCGJxw.csHigh entropy of concatenated method names: 'gtOOwGi7Xv', 'YNwOhBKu5x', 'cmqO1gVB1q', 'xTfOIFHy5t', 'AkNOtchB8w', 'iFEOP8uvUv', 'k2EOCt1TQX', 'es5O94vsh2', 'II2OUGKJPb', 'xBDOEaQEBf'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, e8qt2K2o9KXXIhxxuy.csHigh entropy of concatenated method names: 'vgDrJJSZIK', 'nuLr8ZT5ae', 'xgOr6XkVbw', 'xSdrZ8NLfc', 'Pd9rMosjqS', 'De86g50ku6', 'Kpr63TO7fn', 'hXS6yLyN8y', 'Mbw6Aj7v7e', 'D436mYFFug'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, NUIgOvVHLp2Av3SaQn.csHigh entropy of concatenated method names: 'ATuZwsAXVA', 'TXeZhvuu1a', 'U8EZ1jTPoo', 'fVIZIp297D', 'hr6ZtJ63ss', 'EmPZPYYx0w', 'ew8ZCuIAOG', 'mlMZ9ecCF1', 'E9ZZU060My', 'ma5ZEC7wm1'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, N1nd4yijy5oIUUflYP.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'fHmlmVSJpd', 'OvGlvI8w8M', 'tDrlzoAlYC', 'ri5R7xWCtC', 'qLoRaQuIHU', 'q2iRlRM7A5', 'K49RRP0mCI', 'TdpIB3gXyxMZ5vf7VZG'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.6330000.11.raw.unpack, uSlGo0vGJZHRuiW8Cq.csHigh entropy of concatenated method names: 'PBQOaPUopI', 'nUKORblqqn', 'dmPOSaxmiN', 'yrgOkMxEAc', 'y7yO8ibiYf', 'xTHO6hS2Wn', 'UKDOroIqky', 'fjZWyqbT8r', 'FirWA6SihC', 'VdJWmjheVb'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.5620000.10.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.2e17440.2.raw.unpack, XG.csHigh entropy of concatenated method names: 'S1d', 'RgtTUJcyZL', 'n1Q', 'M1r', 'Y1a', 'U1m', 'k2an4M', 'gt', 'kU', 'rK'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, qDnCwZmwwk5CXau3IU.csHigh entropy of concatenated method names: 'JsgW2qyEji', 'JKoW4D2V94', 'B8JWdv9cHX', 'KB2WKH8SrD', 'RnnWeJ05kD', 'wDjW0efr27', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, wPgmWqMqnbCNwrUNZG.csHigh entropy of concatenated method names: 'vNHRJ3VP1g', 'f2XRkboEpC', 'WnkR8DvHxb', 'tsKRiq6eet', 'EoJR6j8cZv', 'nJDRrvPZIZ', 'bKHRZwy65M', 'ytVRMTn44K', 'A6GRXJiKbn', 'obRRc0mF4R'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, Gpx49TbZyPj2rSfaGq.csHigh entropy of concatenated method names: 'lvIZkhbJeP', 'wvwZircpmf', 'IgIZrRkfCN', 'QCjrvDBXoK', 'OdYrzU1e4c', 'DMKZ7DdUyt', 'a97Zaawx7N', 'XLSZlhyqTV', 'P3BZR2xTXB', 'w77ZStuP3k'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, GmY5cg4l0GFGyWnHMZ.csHigh entropy of concatenated method names: 'RAAjZ8sFBSSU6mTZIoC', 'peHjRDsAjrfU2VE3d4e', 'V5GrWKB6a5', 'nXYrOJhCYx', 'oL1rn3qU8B', 'GLv7sxs1H45nDNn3CMR', 'HldmlksBvLaTbWYnEw0'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, c6dN6MEapJ6S6NyHED.csHigh entropy of concatenated method names: 'tp36tbUXFZ', 'cfl6CTI9HL', 'B4WidvOtvL', 'opDiKMFBTF', 'IHui07KcbO', 'e8oio0fdM0', 'fmqibMXMPX', 'ElWiQDkZHC', 'mtSiVOVfYL', 'tiXixGOdsn'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, FjtX6QAbhgvgoAq3J2.csHigh entropy of concatenated method names: 'eK7WkKSNg8', 'BnDW8Sc0na', 'm7wWiPsfVD', 'ocGW6NCNLO', 'jwCWrt3cip', 'MNxWZM7qY0', 'WkaWMfDSvQ', 'AVBWXQy8sg', 'Hp7WcPnFwh', 'BAVWH2mAUS'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, Dhu0Eh9wMH2k1sIkgU.csHigh entropy of concatenated method names: 'meg8en581P', 'KsE8N2v6uj', 'jMo8BYpIA0', 'EPh8G1Uocc', 'hZq8gAGT4D', 'aQU83qC08n', 'gum8ysDX5m', 'GnQ8Av1OBU', 'axr8mHdbBR', 'PU18v6l0K7'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, XHnqtqaRGtwfMkrPxkr.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'rGLneVeiM7', 'EMgnNDSCWf', 'MDwnB4aPd9', 'bn4nGQolok', 'Rp0nggQ3dY', 'Kiun3t5Zuu', 'QAvnyFYuyf'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, rPnV0i51K4A7vit08C.csHigh entropy of concatenated method names: 'cp7s926KGD', 'PegsUnyjXF', 'bVls2xjix0', 'Qu1s42bXJY', 'uGTsKcrIIq', 'KMCs0hbm7Z', 'NAwsbasD9r', 'SYasQq49BT', 'J6ssxloTT3', 'qpgsYVd98P'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, VumYp58i5pFGA82i9r.csHigh entropy of concatenated method names: 'Dispose', 'drAamiVdGf', 'KAJl4fEXrN', 'IgWJJdkvOh', 'iEjavtX6Qb', 'ygvazgoAq3', 'ProcessDialogKey', 'e2Ll7DnCwZ', 'xwkla5CXau', 'VIUllqSlGo'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, kfI8rR3hWYm2Z2Lf6i.csHigh entropy of concatenated method names: 'rPILAygBDo', 'kysLvNM5ic', 'O4tW7Px2Ah', 'JkYWa8OUYC', 'RlILYBqeys', 'KXFLD8OUio', 'x8FL5SNR9d', 'O9SLet2Jre', 'MiULN8cN0g', 'ioXLBDlJHt'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, QpplLSeQ7jQp9Xcomu.csHigh entropy of concatenated method names: 'ligjxT0U0N', 'b8JjDehWic', 'ujRjeQisnE', 'CdyjNrFlDv', 'sDPj4ZVWKS', 'e5yjdbrqrM', 'N4TjKxGKnl', 'INyj08Z8TX', 'CAyjo0FK7F', 'Gurjb6vApm'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, VJrXt4SQQiCCqYHlFQ.csHigh entropy of concatenated method names: 'sX9aZhu0Eh', 'xMHaM2k1sI', 'vTwacg5Yww', 'Hy5aHCR6dN', 'RyHajEDS8q', 'B2KaTo9KXX', 'YOpfU8WnTuqYEpvuLV', 'xnl8u4Yb02ot9dKrnb', 'QhTaa4xQKE', 'gASaR0ZVpi'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, gQoXauUTwg5Ywwdy5C.csHigh entropy of concatenated method names: 'aRuiIJiZq9', 'c3riPlEDdb', 'xWLi905JCb', 'z49iUFgqNm', 'yjlijkvcQk', 'awAiThYUgB', 'MdriLQMrbS', 'zVViWJqIeN', 'SfNiO8EZuk', 'lpninQQAY5'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, o3R9O2zvp9mUFDyVnC.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'HRIOsvmI24', 'RYvOjc98cd', 'irSOT8mse7', 'aykOLhbLHq', 'JJyOWZsKDh', 'hKlOOn7QtU', 'DNMOnt8QM4'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, P4EHaClHThcWo3JECp.csHigh entropy of concatenated method names: 'iJX1UXaYR', 'Q0yIHbktt', 'NWdPU09Ob', 'Pb7CFDX20', 'D52UrLCRA', 'tmQE0TlE5', 'CNpcrnvGALe5Xusjl6', 'gQAyuhn8VpeAogX4OA', 'fFsW4mhBd', 'O5xnBmj4d'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, UEMvL3a7fTu1ujCGJxw.csHigh entropy of concatenated method names: 'gtOOwGi7Xv', 'YNwOhBKu5x', 'cmqO1gVB1q', 'xTfOIFHy5t', 'AkNOtchB8w', 'iFEOP8uvUv', 'k2EOCt1TQX', 'es5O94vsh2', 'II2OUGKJPb', 'xBDOEaQEBf'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, e8qt2K2o9KXXIhxxuy.csHigh entropy of concatenated method names: 'vgDrJJSZIK', 'nuLr8ZT5ae', 'xgOr6XkVbw', 'xSdrZ8NLfc', 'Pd9rMosjqS', 'De86g50ku6', 'Kpr63TO7fn', 'hXS6yLyN8y', 'Mbw6Aj7v7e', 'D436mYFFug'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, NUIgOvVHLp2Av3SaQn.csHigh entropy of concatenated method names: 'ATuZwsAXVA', 'TXeZhvuu1a', 'U8EZ1jTPoo', 'fVIZIp297D', 'hr6ZtJ63ss', 'EmPZPYYx0w', 'ew8ZCuIAOG', 'mlMZ9ecCF1', 'E9ZZU060My', 'ma5ZEC7wm1'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, N1nd4yijy5oIUUflYP.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'fHmlmVSJpd', 'OvGlvI8w8M', 'tDrlzoAlYC', 'ri5R7xWCtC', 'qLoRaQuIHU', 'q2iRlRM7A5', 'K49RRP0mCI', 'TdpIB3gXyxMZ5vf7VZG'
                      Source: 0.2.eiQXaKJ75nCjEWn.exe.4195340.7.raw.unpack, uSlGo0vGJZHRuiW8Cq.csHigh entropy of concatenated method names: 'PBQOaPUopI', 'nUKORblqqn', 'dmPOSaxmiN', 'yrgOkMxEAc', 'y7yO8ibiYf', 'xTHO6hS2Wn', 'UKDOroIqky', 'fjZWyqbT8r', 'FirWA6SihC', 'VdJWmjheVb'
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: eiQXaKJ75nCjEWn.exe PID: 1660, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory allocated: 2C00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory allocated: 2DB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory allocated: 4DB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory allocated: 63B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory allocated: 73B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory allocated: 75F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory allocated: 85F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 12E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2DA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2B00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 2840Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 6982Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exe TID: 4828Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep count: 40 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -36893488147419080s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7388Thread sleep count: 2840 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -99875s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7388Thread sleep count: 6982 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -99766s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -99657s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -99532s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -99407s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -99282s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -99172s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -99063s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -98938s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -98813s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -98688s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -98563s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -98453s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -98342s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -98234s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -98124s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -98016s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -97891s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -96403s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -96282s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -96156s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -96043s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -95930s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -95813s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -95688s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -95576s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -95410s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -95282s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -95157s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -95032s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -94907s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -94797s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -94688s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -94563s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -94438s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -94313s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -94195s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -94078s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -93969s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -93860s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -93735s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -93610s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -93485s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -93360s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -93248s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -93125s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -93016s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -92906s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -92794s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7380Thread sleep time: -92672s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99875Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99766Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99657Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99532Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99407Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99282Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99172Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99063Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98938Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98813Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98563Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98453Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98342Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98234Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98124Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98016Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97891Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96403Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96282Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96156Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96043Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95930Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95813Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95576Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95410Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95282Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95157Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95032Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 94907Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 94797Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 94688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 94563Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 94438Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 94313Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 94195Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 94078Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 93969Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 93860Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 93735Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 93610Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 93485Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 93360Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 93248Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 93125Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 93016Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 92906Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 92794Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 92672Jump to behavior
                      Source: MSBuild.exe, 00000005.00000002.2463257536.00000000060CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43C000Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: C9F008Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeQueries volume information: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.2460001262.0000000002E18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2457876950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1254325811.0000000004A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2460001262.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1254325811.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: eiQXaKJ75nCjEWn.exe PID: 1660, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7260, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.2e17440.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.5620000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.2e067c8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.5620000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.2e067c8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.2e17440.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.2dd35a4.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.3059560.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.3058548.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.305b578.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1256118946.0000000005620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1251727408.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1251727408.000000000301E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.2457876950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1254325811.0000000004A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2460001262.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1254325811.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: eiQXaKJ75nCjEWn.exe PID: 1660, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7260, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.412c7c8.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.40f1da8.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.2460001262.0000000002E18000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2457876950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1254325811.0000000004A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2460001262.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1254325811.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: eiQXaKJ75nCjEWn.exe PID: 1660, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7260, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.2e17440.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.5620000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.2e067c8.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.5620000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.2e067c8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.2e17440.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.2dd35a4.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.3059560.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.3058548.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.eiQXaKJ75nCjEWn.exe.305b578.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1256118946.0000000005620000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1251727408.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1251727408.000000000301E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      311
                      Process Injection
                      1
                      Masquerading
                      2
                      OS Credential Dumping
                      111
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      12
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      1
                      Input Capture
                      1
                      Process Discovery
                      Remote Desktop Protocol1
                      Input Capture
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                      Virtualization/Sandbox Evasion
                      1
                      Credentials in Registry
                      141
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares11
                      Archive Collected Data
                      1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object Model2
                      Data from Local System
                      12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                      Obfuscated Files or Information
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      eiQXaKJ75nCjEWn.exe53%ReversingLabsByteCode-MSIL.Trojan.SnakeKeyLogger
                      eiQXaKJ75nCjEWn.exe49%VirustotalBrowse
                      eiQXaKJ75nCjEWn.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      bg.microsoft.map.fastly.net0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://r3.i.lencr.org/030%Avira URL Cloudsafe
                      http://mail.pu.edu.af0%Avira URL Cloudsafe
                      http://r3.i.lencr.org/030%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      bg.microsoft.map.fastly.net
                      199.232.210.172
                      truefalseunknown
                      mail.pu.edu.af
                      103.132.98.224
                      truetrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://r3.o.lencr.org0MSBuild.exe, 00000005.00000002.2458821017.0000000000FD6000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2463257536.00000000060CE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://mail.pu.edu.afMSBuild.exe, 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://account.dyn.com/eiQXaKJ75nCjEWn.exe, 00000000.00000002.1254325811.0000000004A11000.00000004.00000800.00020000.00000000.sdmp, eiQXaKJ75nCjEWn.exe, 00000000.00000002.1254325811.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2457876950.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          http://x1.c.lencr.org/0MSBuild.exe, 00000005.00000002.2458821017.0000000000FD6000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2463257536.00000000060CE000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://x1.i.lencr.org/0MSBuild.exe, 00000005.00000002.2458821017.0000000000FD6000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2463257536.00000000060CE000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://r3.i.lencr.org/03MSBuild.exe, 00000005.00000002.2458821017.0000000000FD6000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2463257536.00000000060CE000.00000004.00000020.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          103.132.98.224
                          mail.pu.edu.afAfghanistan
                          58469MOCI-AS-APMinistryofCommunicationITAFtrue
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1436310
                          Start date and time:2024-05-04 10:08:56 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 10s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:15
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:eiQXaKJ75nCjEWn.exe
                          Detection:MAL
                          Classification:mal100.spre.troj.spyw.evad.winEXE@9/1@1/1
                          EGA Information:
                          • Successful, ratio: 50%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 86
                          • Number of non-executed functions: 11
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 20.12.23.50, 199.232.210.172, 13.85.23.206, 72.21.81.240, 52.165.164.15
                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                          • Execution Graph export aborted for target MSBuild.exe, PID 7260 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          10:09:41API Interceptor2x Sleep call for process: eiQXaKJ75nCjEWn.exe modified
                          10:09:45API Interceptor54x Sleep call for process: MSBuild.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          103.132.98.224MehGCkAdgaX9oF0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            wsst63fXULoBQTw.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              bg.microsoft.map.fastly.netZahlungsbeleg 202405029058.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                              • 199.232.214.172
                              Arrival Notice.pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                              • 199.232.210.172
                              Hesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                              • 199.232.210.172
                              invoice PDF -2024.gz.vbsGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              Pedido-Faturado-398731.msiGet hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              LFfjUMuUFU.exeGet hashmaliciousAsyncRAT, PureLog Stealer, XWormBrowse
                              • 199.232.210.172
                              https://www.67rwzb.cn/Get hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              https://jingxinwl.com/Get hashmaliciousUnknownBrowse
                              • 199.232.210.172
                              https://nthturn.com/Get hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              https://bshgjc.com/Get hashmaliciousUnknownBrowse
                              • 199.232.214.172
                              mail.pu.edu.afMehGCkAdgaX9oF0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 103.132.98.224
                              wsst63fXULoBQTw.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 103.132.98.224
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              MOCI-AS-APMinistryofCommunicationITAFMehGCkAdgaX9oF0.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 103.132.98.224
                              wsst63fXULoBQTw.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 103.132.98.224
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              28a2c9bd18a11de089ef85a160da29e40e46.scr.exeGet hashmaliciousAgentTeslaBrowse
                              • 173.222.162.55
                              Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
                              • 173.222.162.55
                              Dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 173.222.162.55
                              #U00d6deme tavsiyesi.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 173.222.162.55
                              E7236252-receipt.vbsGet hashmaliciousXWormBrowse
                              • 173.222.162.55
                              4365078236450.LnK.lnkGet hashmaliciousUnknownBrowse
                              • 173.222.162.55
                              Pedido-Faturado-398731.msiGet hashmaliciousUnknownBrowse
                              • 173.222.162.55
                              SecuriteInfo.com.Win32.Dropper-CHS.435.30054.exeGet hashmaliciousUnknownBrowse
                              • 173.222.162.55
                              SecuriteInfo.com.W32.A-62389890.Eldorado.13265.15378.exeGet hashmaliciousUnknownBrowse
                              • 173.222.162.55
                              SecuriteInfo.com.W32.Tfr.F.tr.27075.5245.exeGet hashmaliciousUnknownBrowse
                              • 173.222.162.55
                              No context
                              Process:C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1216
                              Entropy (8bit):5.34331486778365
                              Encrypted:false
                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.953189410881907
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Win16/32 Executable Delphi generic (2074/23) 0.01%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:eiQXaKJ75nCjEWn.exe
                              File size:702'464 bytes
                              MD5:3fee7d5c6b2adb59a462e7f51004c8ec
                              SHA1:a541bfc296bf972506fb4400f0199edc39b144ee
                              SHA256:268c36f27645590a64c285888fa50d84b06183a27f4c92d598f269790286253a
                              SHA512:0ae3280681b1db7945f49e538a2618b43cd0fa28cf139bb494153d1147e55b9e4d90a5c86af940ed8386072b5cc9ac640a2f5caed296d41b2b34c39b9a9b585f
                              SSDEEP:12288:V3/T3/fVrTtK3/6k8d5VA/GhMQOEV5gZfR5x52GfLa09pgM+Vjp1DRaTmqIHN1Ts:VrXVrTtKSzVAeOUa5r52GfLaUbC1bqMy
                              TLSH:66E4224E77CA5B35CA3FB3F005458A8063F13526B861E61A7E9D25C92CD6F218F903A7
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Gd3f..............0..x...8........... ........@.. ....................................@................................
                              Icon Hash:0773f1fcfccc6113
                              Entrypoint:0x4a901e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x66336447 [Thu May 2 10:00:39 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              aaa
                              inc edi
                              aaa
                              dec eax
                              xor eax, 42000000h
                              xor eax, 4E343531h
                              xor eax, 32414939h
                              dec ecx
                              aaa
                              aaa
                              inc ebp
                              xor al, 56h
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa8fcc0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x2ce4.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xa70440xa78004d8fac92fa2784a56bfea99c57228433False0.959100979477612data7.9724800598562675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0xaa0000x2ce40x30008bdde29d020c07ce5c2a20e5754a0e1bFalse0.8715006510416666data7.429580991951343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xae0000xc0x80094cbc119202bb68b3961e163cd6e7ce9False0.015625data0.03037337037012526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0xaa1000x26cdPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9980871841336958
                              RT_GROUP_ICON0xac7e00x14data1.05
                              RT_VERSION0xac8040x2e0data0.44565217391304346
                              RT_MANIFEST0xacaf40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSource PortDest PortSource IPDest IP
                              May 4, 2024 10:09:38.481134892 CEST49671443192.168.2.10204.79.197.203
                              May 4, 2024 10:09:38.792804956 CEST49671443192.168.2.10204.79.197.203
                              May 4, 2024 10:09:39.402147055 CEST49671443192.168.2.10204.79.197.203
                              May 4, 2024 10:09:39.683434010 CEST49674443192.168.2.10173.222.162.55
                              May 4, 2024 10:09:39.685877085 CEST49675443192.168.2.10173.222.162.55
                              May 4, 2024 10:09:40.605201006 CEST49671443192.168.2.10204.79.197.203
                              May 4, 2024 10:09:43.011481047 CEST49671443192.168.2.10204.79.197.203
                              May 4, 2024 10:09:46.178925037 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:46.613029957 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:46.613121986 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:46.746184111 CEST49677443192.168.2.1020.42.65.85
                              May 4, 2024 10:09:47.089606047 CEST49677443192.168.2.1020.42.65.85
                              May 4, 2024 10:09:47.698967934 CEST49677443192.168.2.1020.42.65.85
                              May 4, 2024 10:09:47.823982000 CEST49671443192.168.2.10204.79.197.203
                              May 4, 2024 10:09:48.061649084 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:48.105245113 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:48.186958075 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:48.620254040 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:48.620276928 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:48.667723894 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:48.669600010 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:48.902188063 CEST49677443192.168.2.1020.42.65.85
                              May 4, 2024 10:09:49.103806973 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:49.152137995 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:49.213778019 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:49.292715073 CEST49674443192.168.2.10173.222.162.55
                              May 4, 2024 10:09:49.292731047 CEST49675443192.168.2.10173.222.162.55
                              May 4, 2024 10:09:49.648464918 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:49.648489952 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:49.648504019 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:49.648556948 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:49.710568905 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:50.144686937 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:50.198981047 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:50.239800930 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:50.674072981 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:50.675327063 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:51.109024048 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:51.110713959 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:51.417743921 CEST49677443192.168.2.1020.42.65.85
                              May 4, 2024 10:09:51.558415890 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:51.558764935 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:51.998689890 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:51.998976946 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:52.471383095 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:52.483849049 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:52.484118938 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:52.917216063 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:52.917557955 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:52.918416023 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:52.918533087 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:52.918566942 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:52.918596029 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:53.351932049 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:53.351957083 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:53.403772116 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:09:53.448995113 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:09:56.230262041 CEST49677443192.168.2.1020.42.65.85
                              May 4, 2024 10:09:57.433408976 CEST49671443192.168.2.10204.79.197.203
                              May 4, 2024 10:10:02.687715054 CEST49672443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:02.688781977 CEST49709443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:02.688829899 CEST44349709173.222.162.55192.168.2.10
                              May 4, 2024 10:10:02.688889980 CEST49709443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:02.689393044 CEST49709443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:02.689408064 CEST44349709173.222.162.55192.168.2.10
                              May 4, 2024 10:10:02.995886087 CEST49672443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:03.021995068 CEST44349709173.222.162.55192.168.2.10
                              May 4, 2024 10:10:03.022070885 CEST49709443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:03.605237007 CEST49672443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:04.808373928 CEST49672443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:05.839618921 CEST49677443192.168.2.1020.42.65.85
                              May 4, 2024 10:10:07.214704037 CEST49672443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:12.027232885 CEST49672443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:21.636523008 CEST49672443192.168.2.10173.222.162.55
                              May 4, 2024 10:10:22.175576925 CEST44349709173.222.162.55192.168.2.10
                              May 4, 2024 10:10:22.175651073 CEST49709443192.168.2.10173.222.162.55
                              May 4, 2024 10:11:25.699975967 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:11:26.133450031 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:11:26.133474112 CEST58749706103.132.98.224192.168.2.10
                              May 4, 2024 10:11:26.133675098 CEST49706587192.168.2.10103.132.98.224
                              May 4, 2024 10:11:26.142895937 CEST49706587192.168.2.10103.132.98.224
                              TimestampSource PortDest PortSource IPDest IP
                              May 4, 2024 10:09:45.680113077 CEST5975253192.168.2.101.1.1.1
                              May 4, 2024 10:09:46.170731068 CEST53597521.1.1.1192.168.2.10
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              May 4, 2024 10:09:45.680113077 CEST192.168.2.101.1.1.10x17bStandard query (0)mail.pu.edu.afA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              May 4, 2024 10:09:46.170731068 CEST1.1.1.1192.168.2.100x17bNo error (0)mail.pu.edu.af103.132.98.224A (IP address)IN (0x0001)false
                              May 4, 2024 10:10:02.548126936 CEST1.1.1.1192.168.2.100x5ec9No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                              May 4, 2024 10:10:02.548126936 CEST1.1.1.1192.168.2.100x5ec9No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                              TimestampSource PortDest PortSource IPDest IPCommands
                              May 4, 2024 10:09:48.061649084 CEST58749706103.132.98.224192.168.2.10220 scloud.andc.gov.af ESMTP Postfix
                              May 4, 2024 10:09:48.186958075 CEST49706587192.168.2.10103.132.98.224EHLO 651689
                              May 4, 2024 10:09:48.620276928 CEST58749706103.132.98.224192.168.2.10250-scloud.andc.gov.af
                              250-PIPELINING
                              250-SIZE 204800000
                              250-ETRN
                              250-STARTTLS
                              250-AUTH PLAIN LOGIN
                              250-AUTH=PLAIN LOGIN
                              250-ENHANCEDSTATUSCODES
                              250-8BITMIME
                              250-DSN
                              250 CHUNKING
                              May 4, 2024 10:09:48.669600010 CEST49706587192.168.2.10103.132.98.224STARTTLS
                              May 4, 2024 10:09:49.103806973 CEST58749706103.132.98.224192.168.2.10220 2.0.0 Ready to start TLS

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:10:09:40
                              Start date:04/05/2024
                              Path:C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\eiQXaKJ75nCjEWn.exe"
                              Imagebase:0xa80000
                              File size:702'464 bytes
                              MD5 hash:3FEE7D5C6B2ADB59A462E7F51004C8EC
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1256118946.0000000005620000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1254325811.0000000004A11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1254325811.0000000004A11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1254325811.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1254325811.00000000040F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1251727408.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1251727408.000000000301E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:2
                              Start time:10:09:41
                              Start date:04/05/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              Imagebase:0x2c0000
                              File size:262'432 bytes
                              MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:3
                              Start time:10:09:41
                              Start date:04/05/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              Imagebase:0x320000
                              File size:262'432 bytes
                              MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:4
                              Start time:10:09:41
                              Start date:04/05/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              Imagebase:0x20000
                              File size:262'432 bytes
                              MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:5
                              Start time:10:09:41
                              Start date:04/05/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              Imagebase:0xa80000
                              File size:262'432 bytes
                              MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2460001262.0000000002E18000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2460001262.0000000002DEE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2457876950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2457876950.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2460001262.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2460001262.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:moderate
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:9.8%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:239
                                Total number of Limit Nodes:14
                                execution_graph 28155 5fdd068 28156 5fdd1f3 28155->28156 28158 5fdd08e 28155->28158 28158->28156 28159 5fdcc60 28158->28159 28160 5fdd2e8 PostMessageW 28159->28160 28161 5fdd354 28160->28161 28161->28158 28162 2d7d4e0 28163 2d7d526 28162->28163 28167 2d7d6c0 28163->28167 28170 2d7d6b0 28163->28170 28164 2d7d613 28173 2d7d07c 28167->28173 28171 2d7d6ee 28170->28171 28172 2d7d07c DuplicateHandle 28170->28172 28171->28164 28172->28171 28174 2d7d728 DuplicateHandle 28173->28174 28175 2d7d6ee 28174->28175 28175->28164 28176 5fde800 28177 5fde828 28176->28177 28178 5fde81e 28176->28178 28181 5fde868 28178->28181 28186 5fde853 28178->28186 28182 5fde876 28181->28182 28185 5fde895 28181->28185 28190 5fddd8c 28182->28190 28185->28177 28187 5fde884 28186->28187 28188 5fddd8c FindCloseChangeNotification 28187->28188 28189 5fde891 28188->28189 28189->28177 28191 5fde9e0 FindCloseChangeNotification 28190->28191 28192 5fde891 28191->28192 28192->28177 27981 5fdaab2 27986 5fdb8c0 27981->27986 28002 5fdb96e 27981->28002 28019 5fdb8b0 27981->28019 27982 5fdaac1 27987 5fdb8da 27986->27987 27996 5fdb8e2 27987->27996 28035 5fdc3c7 27987->28035 28039 5fdbf25 27987->28039 28048 5fdbeab 27987->28048 28053 5fdc36e 27987->28053 28058 5fdbe12 27987->28058 28064 5fdbd72 27987->28064 28069 5fdc311 27987->28069 28073 5fdc057 27987->28073 28078 5fdbe1a 27987->28078 28084 5fdbf78 27987->28084 28089 5fdc358 27987->28089 28093 5fdbf98 27987->28093 28098 5fdc562 27987->28098 27996->27982 28003 5fdb8fc 28002->28003 28004 5fdb971 28002->28004 28005 5fdbf98 2 API calls 28003->28005 28006 5fdc358 2 API calls 28003->28006 28007 5fdbf78 2 API calls 28003->28007 28008 5fdbe1a 2 API calls 28003->28008 28009 5fdc057 2 API calls 28003->28009 28010 5fdc311 2 API calls 28003->28010 28011 5fdbd72 2 API calls 28003->28011 28012 5fdbe12 2 API calls 28003->28012 28013 5fdb8e2 28003->28013 28014 5fdc36e 2 API calls 28003->28014 28015 5fdbeab 2 API calls 28003->28015 28016 5fdbf25 4 API calls 28003->28016 28017 5fdc3c7 2 API calls 28003->28017 28018 5fdc562 2 API calls 28003->28018 28004->27982 28005->28013 28006->28013 28007->28013 28008->28013 28009->28013 28010->28013 28011->28013 28012->28013 28013->27982 28014->28013 28015->28013 28016->28013 28017->28013 28018->28013 28020 5fdb8c0 28019->28020 28021 5fdbf98 2 API calls 28020->28021 28022 5fdc358 2 API calls 28020->28022 28023 5fdbf78 2 API calls 28020->28023 28024 5fdbe1a 2 API calls 28020->28024 28025 5fdc057 2 API calls 28020->28025 28026 5fdc311 2 API calls 28020->28026 28027 5fdbd72 2 API calls 28020->28027 28028 5fdbe12 2 API calls 28020->28028 28029 5fdb8e2 28020->28029 28030 5fdc36e 2 API calls 28020->28030 28031 5fdbeab 2 API calls 28020->28031 28032 5fdbf25 4 API calls 28020->28032 28033 5fdc3c7 2 API calls 28020->28033 28034 5fdc562 2 API calls 28020->28034 28021->28029 28022->28029 28023->28029 28024->28029 28025->28029 28026->28029 28027->28029 28028->28029 28029->27982 28030->28029 28031->28029 28032->28029 28033->28029 28034->28029 28102 5fda488 28035->28102 28106 5fda490 28035->28106 28036 5fdc3e9 28036->27996 28040 5fdc28d 28039->28040 28041 5fdbf32 28039->28041 28043 5fdc4ae 28040->28043 28110 5fd9d18 28040->28110 28114 5fd9d20 28040->28114 28118 5fdcc18 28041->28118 28043->27996 28044 5fdc3a8 28049 5fdbeb4 28048->28049 28050 5fdbee2 28049->28050 28131 5fda61c 28049->28131 28135 5fda628 28049->28135 28050->27996 28054 5fdc37b 28053->28054 28056 5fd9d18 ResumeThread 28054->28056 28057 5fd9d20 ResumeThread 28054->28057 28055 5fdc3a8 28056->28055 28057->28055 28060 5fdbd76 28058->28060 28059 5fdbe30 28059->27996 28060->28059 28062 5fda61c CreateProcessA 28060->28062 28063 5fda628 CreateProcessA 28060->28063 28061 5fdbee2 28061->27996 28062->28061 28063->28061 28065 5fdbd76 28064->28065 28067 5fda61c CreateProcessA 28065->28067 28068 5fda628 CreateProcessA 28065->28068 28066 5fdbee2 28066->27996 28067->28066 28068->28066 28071 5fd9dc9 Wow64SetThreadContext 28069->28071 28072 5fd9dd0 Wow64SetThreadContext 28069->28072 28070 5fdc310 28070->28069 28071->28070 28072->28070 28074 5fdc064 28073->28074 28139 5fda398 28074->28139 28143 5fda3a0 28074->28143 28075 5fdc2fc 28075->27996 28079 5fdbd97 28078->28079 28080 5fdbd76 28078->28080 28079->27996 28080->28079 28082 5fda61c CreateProcessA 28080->28082 28083 5fda628 CreateProcessA 28080->28083 28081 5fdbee2 28081->27996 28082->28081 28083->28081 28085 5fdbf7e 28084->28085 28147 5fda2d8 28085->28147 28151 5fda2e0 28085->28151 28086 5fdc78a 28090 5fdc310 28089->28090 28090->28089 28091 5fd9dc9 Wow64SetThreadContext 28090->28091 28092 5fd9dd0 Wow64SetThreadContext 28090->28092 28091->28090 28092->28090 28094 5fdbfa8 28093->28094 28096 5fda398 WriteProcessMemory 28094->28096 28097 5fda3a0 WriteProcessMemory 28094->28097 28095 5fdc701 28096->28095 28097->28095 28099 5fdc7b2 28098->28099 28100 5fda398 WriteProcessMemory 28099->28100 28101 5fda3a0 WriteProcessMemory 28099->28101 28100->28099 28101->28099 28103 5fda490 ReadProcessMemory 28102->28103 28105 5fda51f 28103->28105 28105->28036 28107 5fda4db ReadProcessMemory 28106->28107 28109 5fda51f 28107->28109 28109->28036 28111 5fd9d60 ResumeThread 28110->28111 28113 5fd9d91 28111->28113 28113->28044 28115 5fd9d60 ResumeThread 28114->28115 28117 5fd9d91 28115->28117 28117->28044 28119 5fdcc2d 28118->28119 28123 5fd9dc9 28119->28123 28127 5fd9dd0 28119->28127 28120 5fdc5a9 28124 5fd9dd0 Wow64SetThreadContext 28123->28124 28126 5fd9e5d 28124->28126 28126->28120 28128 5fd9e15 Wow64SetThreadContext 28127->28128 28130 5fd9e5d 28128->28130 28130->28120 28132 5fda6b1 CreateProcessA 28131->28132 28134 5fda873 28132->28134 28136 5fda6b1 CreateProcessA 28135->28136 28138 5fda873 28136->28138 28140 5fda3a0 WriteProcessMemory 28139->28140 28142 5fda43f 28140->28142 28142->28075 28144 5fda3e8 WriteProcessMemory 28143->28144 28146 5fda43f 28144->28146 28146->28075 28148 5fda320 VirtualAllocEx 28147->28148 28150 5fda35d 28148->28150 28150->28086 28152 5fda320 VirtualAllocEx 28151->28152 28154 5fda35d 28152->28154 28154->28086 28193 2d74668 28194 2d7467f 28193->28194 28195 2d7468b 28194->28195 28199 2d74798 28194->28199 28204 2d74238 28195->28204 28197 2d746aa 28200 2d747bd 28199->28200 28208 2d74898 28200->28208 28212 2d748a8 28200->28212 28205 2d74243 28204->28205 28220 2d75ca4 28205->28220 28207 2d770f8 28207->28197 28210 2d748a8 28208->28210 28209 2d749ac 28209->28209 28210->28209 28216 2d74508 28210->28216 28213 2d748cf 28212->28213 28214 2d749ac 28213->28214 28215 2d74508 CreateActCtxA 28213->28215 28215->28214 28217 2d75938 CreateActCtxA 28216->28217 28219 2d759fb 28217->28219 28221 2d75caf 28220->28221 28224 2d75cc4 28221->28224 28223 2d7719d 28223->28207 28225 2d75ccf 28224->28225 28228 2d75cf4 28225->28228 28227 2d7727a 28227->28223 28229 2d75cff 28228->28229 28232 2d75d24 28229->28232 28231 2d7736d 28231->28227 28233 2d75d2f 28232->28233 28235 2d7866b 28233->28235 28239 2d7ad18 28233->28239 28234 2d786a9 28234->28231 28235->28234 28243 2d7ce00 28235->28243 28248 2d7ce10 28235->28248 28253 2d7ad50 28239->28253 28256 2d7ad3f 28239->28256 28240 2d7ad2e 28240->28235 28244 2d7ce10 28243->28244 28245 2d7ce55 28244->28245 28280 2d7d3c8 28244->28280 28284 2d7d3b8 28244->28284 28245->28234 28249 2d7ce31 28248->28249 28250 2d7ce55 28249->28250 28251 2d7d3c8 2 API calls 28249->28251 28252 2d7d3b8 2 API calls 28249->28252 28250->28234 28251->28250 28252->28250 28260 2d7ae48 28253->28260 28254 2d7ad5f 28254->28240 28257 2d7ad50 28256->28257 28259 2d7ae48 2 API calls 28257->28259 28258 2d7ad5f 28258->28240 28259->28258 28261 2d7ae59 28260->28261 28262 2d7ae7c 28260->28262 28261->28262 28268 2d7b0d2 28261->28268 28272 2d7b0e0 28261->28272 28262->28254 28263 2d7b080 GetModuleHandleW 28265 2d7b0ad 28263->28265 28264 2d7ae74 28264->28262 28264->28263 28265->28254 28270 2d7b0e0 28268->28270 28269 2d7b119 28269->28264 28270->28269 28276 2d7a228 28270->28276 28273 2d7b0f4 28272->28273 28274 2d7b119 28273->28274 28275 2d7a228 LoadLibraryExW 28273->28275 28274->28264 28275->28274 28277 2d7b6c0 LoadLibraryExW 28276->28277 28279 2d7b739 28277->28279 28279->28269 28282 2d7d3d5 28280->28282 28281 2d7d40f 28281->28245 28282->28281 28288 2d7cfb4 28282->28288 28286 2d7d3c8 28284->28286 28285 2d7d40f 28285->28245 28286->28285 28287 2d7cfb4 2 API calls 28286->28287 28287->28285 28289 2d7cfb9 28288->28289 28291 2d7dd20 28289->28291 28292 2d7d0dc 28289->28292 28291->28291 28293 2d7d0e7 28292->28293 28294 2d75d24 2 API calls 28293->28294 28295 2d7dd8f 28294->28295 28295->28291
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9b4152c7dc31f6f6ae36fcfc0b69d95af8f369165b597c8fdae9b9d543ff9e2f
                                • Instruction ID: cba3d8966e80fce6ee022616209d741a41e0a62dc94ac89ff5fea6a85deb6a49
                                • Opcode Fuzzy Hash: 9b4152c7dc31f6f6ae36fcfc0b69d95af8f369165b597c8fdae9b9d543ff9e2f
                                • Instruction Fuzzy Hash: 11327971B012049FDB19DB65C854BAEBBFBAF89704F184069E646DB390DB39EC01CB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 015a056fb802de7b073f5d715c6492f920c90665eead9f467fabb7f5dbf78d58
                                • Instruction ID: 69a9292f3e0fc06da0abe525c14662f83d15cc9c5acc836cf81700684b8d1fcd
                                • Opcode Fuzzy Hash: 015a056fb802de7b073f5d715c6492f920c90665eead9f467fabb7f5dbf78d58
                                • Instruction Fuzzy Hash: D521D871E15618CBEB48CF6BC94469EFBF7AFC9200F08C5B9D508A6254EB340A458F51
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 880bd6111d4562e920980a78305b6a3d07a198abd207372674fb37e44feba434
                                • Instruction ID: 8668405d3b403a024c31b64140f7802addf846813f4b072f3828826002f8f0b3
                                • Opcode Fuzzy Hash: 880bd6111d4562e920980a78305b6a3d07a198abd207372674fb37e44feba434
                                • Instruction Fuzzy Hash: 33A00202D8F10591D4009C1104184B5D03F120B540F4E3003402A3311A052CC5048C7C
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 5fda61c-5fda6bd 2 5fda6bf-5fda6c9 0->2 3 5fda6f6-5fda716 0->3 2->3 4 5fda6cb-5fda6cd 2->4 10 5fda74f-5fda77e 3->10 11 5fda718-5fda722 3->11 5 5fda6cf-5fda6d9 4->5 6 5fda6f0-5fda6f3 4->6 8 5fda6dd-5fda6ec 5->8 9 5fda6db 5->9 6->3 8->8 12 5fda6ee 8->12 9->8 17 5fda7b7-5fda871 CreateProcessA 10->17 18 5fda780-5fda78a 10->18 11->10 13 5fda724-5fda726 11->13 12->6 15 5fda749-5fda74c 13->15 16 5fda728-5fda732 13->16 15->10 19 5fda734 16->19 20 5fda736-5fda745 16->20 31 5fda87a-5fda900 17->31 32 5fda873-5fda879 17->32 18->17 21 5fda78c-5fda78e 18->21 19->20 20->20 22 5fda747 20->22 23 5fda7b1-5fda7b4 21->23 24 5fda790-5fda79a 21->24 22->15 23->17 26 5fda79c 24->26 27 5fda79e-5fda7ad 24->27 26->27 27->27 28 5fda7af 27->28 28->23 42 5fda910-5fda914 31->42 43 5fda902-5fda906 31->43 32->31 45 5fda924-5fda928 42->45 46 5fda916-5fda91a 42->46 43->42 44 5fda908 43->44 44->42 48 5fda938-5fda93c 45->48 49 5fda92a-5fda92e 45->49 46->45 47 5fda91c 46->47 47->45 50 5fda94e-5fda955 48->50 51 5fda93e-5fda944 48->51 49->48 52 5fda930 49->52 53 5fda96c 50->53 54 5fda957-5fda966 50->54 51->50 52->48 56 5fda96d 53->56 54->53 56->56
                                APIs
                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05FDA85E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: 47f82e4f0dba047f12d82262ec5bc11db58674384d6038917963615e6f09cbdf
                                • Instruction ID: 521c091e4a1c44cf23bea53d8b6e9346a06f1279399f98c97f9b66007c0d4dc1
                                • Opcode Fuzzy Hash: 47f82e4f0dba047f12d82262ec5bc11db58674384d6038917963615e6f09cbdf
                                • Instruction Fuzzy Hash: 7A915B71D006198FEB20DF68C841BEEFBB3BB48310F198569E849A7240D7789985CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 57 5fda628-5fda6bd 59 5fda6bf-5fda6c9 57->59 60 5fda6f6-5fda716 57->60 59->60 61 5fda6cb-5fda6cd 59->61 67 5fda74f-5fda77e 60->67 68 5fda718-5fda722 60->68 62 5fda6cf-5fda6d9 61->62 63 5fda6f0-5fda6f3 61->63 65 5fda6dd-5fda6ec 62->65 66 5fda6db 62->66 63->60 65->65 69 5fda6ee 65->69 66->65 74 5fda7b7-5fda871 CreateProcessA 67->74 75 5fda780-5fda78a 67->75 68->67 70 5fda724-5fda726 68->70 69->63 72 5fda749-5fda74c 70->72 73 5fda728-5fda732 70->73 72->67 76 5fda734 73->76 77 5fda736-5fda745 73->77 88 5fda87a-5fda900 74->88 89 5fda873-5fda879 74->89 75->74 78 5fda78c-5fda78e 75->78 76->77 77->77 79 5fda747 77->79 80 5fda7b1-5fda7b4 78->80 81 5fda790-5fda79a 78->81 79->72 80->74 83 5fda79c 81->83 84 5fda79e-5fda7ad 81->84 83->84 84->84 85 5fda7af 84->85 85->80 99 5fda910-5fda914 88->99 100 5fda902-5fda906 88->100 89->88 102 5fda924-5fda928 99->102 103 5fda916-5fda91a 99->103 100->99 101 5fda908 100->101 101->99 105 5fda938-5fda93c 102->105 106 5fda92a-5fda92e 102->106 103->102 104 5fda91c 103->104 104->102 107 5fda94e-5fda955 105->107 108 5fda93e-5fda944 105->108 106->105 109 5fda930 106->109 110 5fda96c 107->110 111 5fda957-5fda966 107->111 108->107 109->105 113 5fda96d 110->113 111->110 113->113
                                APIs
                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05FDA85E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: CreateProcess
                                • String ID:
                                • API String ID: 963392458-0
                                • Opcode ID: 734b2b8de62113c532a14bd21e77894c6f44fffb17a6be2243395ace4e22953e
                                • Instruction ID: eb9a0ed4ccc65276f999abd0964ee19e96e62cb72b69e1c3fa785aa43768a767
                                • Opcode Fuzzy Hash: 734b2b8de62113c532a14bd21e77894c6f44fffb17a6be2243395ace4e22953e
                                • Instruction Fuzzy Hash: 65915A71D006199FEB20DF68C840BEEFBB2FF44310F198569E849A7240DB789985CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 114 2d7ae48-2d7ae57 115 2d7ae83-2d7ae87 114->115 116 2d7ae59-2d7ae66 call 2d7a1c0 114->116 118 2d7ae9b-2d7aedc 115->118 119 2d7ae89-2d7ae93 115->119 123 2d7ae7c 116->123 124 2d7ae68 116->124 125 2d7aede-2d7aee6 118->125 126 2d7aee9-2d7aef7 118->126 119->118 123->115 170 2d7ae6e call 2d7b0d2 124->170 171 2d7ae6e call 2d7b0e0 124->171 125->126 127 2d7af1b-2d7af1d 126->127 128 2d7aef9-2d7aefe 126->128 133 2d7af20-2d7af27 127->133 130 2d7af00-2d7af07 call 2d7a1cc 128->130 131 2d7af09 128->131 129 2d7ae74-2d7ae76 129->123 132 2d7afb8-2d7b078 129->132 137 2d7af0b-2d7af19 130->137 131->137 165 2d7b080-2d7b0ab GetModuleHandleW 132->165 166 2d7b07a-2d7b07d 132->166 134 2d7af34-2d7af3b 133->134 135 2d7af29-2d7af31 133->135 138 2d7af3d-2d7af45 134->138 139 2d7af48-2d7af51 call 2d7a1dc 134->139 135->134 137->133 138->139 145 2d7af53-2d7af5b 139->145 146 2d7af5e-2d7af63 139->146 145->146 147 2d7af65-2d7af6c 146->147 148 2d7af81-2d7af8e 146->148 147->148 150 2d7af6e-2d7af7e call 2d7a1ec call 2d7a1fc 147->150 154 2d7afb1-2d7afb7 148->154 155 2d7af90-2d7afae 148->155 150->148 155->154 167 2d7b0b4-2d7b0c8 165->167 168 2d7b0ad-2d7b0b3 165->168 166->165 168->167 170->129 171->129
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 02D7B09E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1251620380.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2d70000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 7e048dc6094bcf405d8078b8f04368f619142ddd958ba089fa92651ff2624370
                                • Instruction ID: f63634ec54a457c51f6e2f25ed5dfee563d8e09f34a9f9983da95b87b75b6bf2
                                • Opcode Fuzzy Hash: 7e048dc6094bcf405d8078b8f04368f619142ddd958ba089fa92651ff2624370
                                • Instruction Fuzzy Hash: 207124B1A00B058FD724DF29D44175ABBF5FF88304F108A2EE48A97B40E779E945CB90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 172 2d74508-2d759f9 CreateActCtxA 175 2d75a02-2d75a5c 172->175 176 2d759fb-2d75a01 172->176 183 2d75a5e-2d75a61 175->183 184 2d75a6b-2d75a6f 175->184 176->175 183->184 185 2d75a71-2d75a7d 184->185 186 2d75a80-2d75ab0 184->186 185->186 190 2d75a62-2d75a64 186->190 191 2d75ab2-2d75b34 186->191 190->184
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 02D759E9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1251620380.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2d70000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 76de374cce8f2a2eee8083eec7748b1919763b9d990a85942cbe7a94b7764571
                                • Instruction ID: a32cf78f2319550d8db0598aabfebee3d31c9f2673c156539bc7c4b30ebf548b
                                • Opcode Fuzzy Hash: 76de374cce8f2a2eee8083eec7748b1919763b9d990a85942cbe7a94b7764571
                                • Instruction Fuzzy Hash: 5A41F270D04719CBEB24CFA9C884B9DBBF5FF49304F60816AD409AB250DBB5694ACF91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 193 2d7592d-2d759f9 CreateActCtxA 195 2d75a02-2d75a5c 193->195 196 2d759fb-2d75a01 193->196 203 2d75a5e-2d75a61 195->203 204 2d75a6b-2d75a6f 195->204 196->195 203->204 205 2d75a71-2d75a7d 204->205 206 2d75a80-2d75ab0 204->206 205->206 210 2d75a62-2d75a64 206->210 211 2d75ab2-2d75b34 206->211 210->204
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 02D759E9
                                Memory Dump Source
                                • Source File: 00000000.00000002.1251620380.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2d70000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: f4585bdf80e6618e0b12ace158694bb1f565a80f0fba997232c6692c5f9c60db
                                • Instruction ID: 14730a10ac2904925e05a10529cd99b583e5ca583ca9800f7235abedc825d176
                                • Opcode Fuzzy Hash: f4585bdf80e6618e0b12ace158694bb1f565a80f0fba997232c6692c5f9c60db
                                • Instruction Fuzzy Hash: B241E071D04719CFEB24CFA9C884B9EBBB1FF49304F60816AD408AB250DBB5694ACF51
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 213 5fda398-5fda3ee 216 5fda3fe-5fda43d WriteProcessMemory 213->216 217 5fda3f0-5fda3fc 213->217 219 5fda43f-5fda445 216->219 220 5fda446-5fda476 216->220 217->216 219->220
                                APIs
                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05FDA430
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: e81fef9ea6c18e64e87622f9f3559bd6d657651a5e658107793a3caeb716fc7a
                                • Instruction ID: 6b728b19cf8b9265e8e9ea4efe75b3746026f449e27f08858c86218ede57ae45
                                • Opcode Fuzzy Hash: e81fef9ea6c18e64e87622f9f3559bd6d657651a5e658107793a3caeb716fc7a
                                • Instruction Fuzzy Hash: B0214675D003499FDB10CFAAC884BEEBBF5FF48310F548429E959A7250C7789945CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 224 5fda3a0-5fda3ee 226 5fda3fe-5fda43d WriteProcessMemory 224->226 227 5fda3f0-5fda3fc 224->227 229 5fda43f-5fda445 226->229 230 5fda446-5fda476 226->230 227->226 229->230
                                APIs
                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 05FDA430
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: MemoryProcessWrite
                                • String ID:
                                • API String ID: 3559483778-0
                                • Opcode ID: e2c5ba550eee4adbf339f1919c4c63a591149bb2037f31860533e9aacdddf1ce
                                • Instruction ID: ee3b270aa7408e5e83f4d142a66dcb29c6e4b0e2a2deb251b1671c142a285c53
                                • Opcode Fuzzy Hash: e2c5ba550eee4adbf339f1919c4c63a591149bb2037f31860533e9aacdddf1ce
                                • Instruction Fuzzy Hash: B8212475D003499FDB10DFAAC884BEEBBF5FF48310F14842AE959A7250C7799944CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 234 2d7d07c-2d7d7bc DuplicateHandle 236 2d7d7c5-2d7d7e2 234->236 237 2d7d7be-2d7d7c4 234->237 237->236
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02D7D6EE,?,?,?,?,?), ref: 02D7D7AF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1251620380.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2d70000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 87e3b36e324444f0edf78c6a8e5daad8ba31ee55514065d4df492b96c42672e3
                                • Instruction ID: 948952eb49e862eb14622f839ea94cfe735cfa3ee004f14a6fa1b06a5885dde3
                                • Opcode Fuzzy Hash: 87e3b36e324444f0edf78c6a8e5daad8ba31ee55514065d4df492b96c42672e3
                                • Instruction Fuzzy Hash: CA21E4B5900348AFDB10CF9AD584AEEFBF9EF48310F14841AE919A7310D379A954CFA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 251 5fda488-5fda51d ReadProcessMemory 255 5fda51f-5fda525 251->255 256 5fda526-5fda556 251->256 255->256
                                APIs
                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05FDA510
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: MemoryProcessRead
                                • String ID:
                                • API String ID: 1726664587-0
                                • Opcode ID: d8a33e6b6f3a27a7638213cc1a41e82c94e886ae907f6c24a64b60169f36cdba
                                • Instruction ID: d50b6658cb77eadaa6deedbfcd957fe6d8d01f08c4d9583e8e6568f275633d9b
                                • Opcode Fuzzy Hash: d8a33e6b6f3a27a7638213cc1a41e82c94e886ae907f6c24a64b60169f36cdba
                                • Instruction Fuzzy Hash: 4A21F472D003499FDB10DFAAC880BEEBBF5FF48210F148429E959A7240D7799945CBA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 240 5fd9dc9-5fd9e1b 243 5fd9e1d-5fd9e29 240->243 244 5fd9e2b-5fd9e5b Wow64SetThreadContext 240->244 243->244 246 5fd9e5d-5fd9e63 244->246 247 5fd9e64-5fd9e94 244->247 246->247
                                APIs
                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05FD9E4E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: 39756c7af48dcdc342a51b560a6e3daa831aa25cd9f3dd0a2e2a85bb51a5b264
                                • Instruction ID: 1f8d2eaad2a0ef0bb9664b862566f871aa5587d8c0f4355b13bb6d1b26c80f93
                                • Opcode Fuzzy Hash: 39756c7af48dcdc342a51b560a6e3daa831aa25cd9f3dd0a2e2a85bb51a5b264
                                • Instruction Fuzzy Hash: 07213871D003098FDB20DFAAC5857EEFBF5EF48214F148429E519A7241C778A945CFA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 260 2d7d720-2d7d722 261 2d7d728-2d7d7bc DuplicateHandle 260->261 262 2d7d7c5-2d7d7e2 261->262 263 2d7d7be-2d7d7c4 261->263 263->262
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02D7D6EE,?,?,?,?,?), ref: 02D7D7AF
                                Memory Dump Source
                                • Source File: 00000000.00000002.1251620380.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2d70000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 7f2b1c7ebf0c43162187bdc9b92cfe2e2f33d6957d6ae3a7960f400894dce0ff
                                • Instruction ID: 8465304d8e27ee13987d5e4c8cf5f5a5bd34c5018b44fbdf65fc8fe2a839c171
                                • Opcode Fuzzy Hash: 7f2b1c7ebf0c43162187bdc9b92cfe2e2f33d6957d6ae3a7960f400894dce0ff
                                • Instruction Fuzzy Hash: 3921E5B5D003089FDB10CF9AD584ADEFBF9EB48310F14841AE914A7310D375A944CFA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 276 5fda490-5fda51d ReadProcessMemory 279 5fda51f-5fda525 276->279 280 5fda526-5fda556 276->280 279->280
                                APIs
                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05FDA510
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: MemoryProcessRead
                                • String ID:
                                • API String ID: 1726664587-0
                                • Opcode ID: a5b347c5628a259a3c6271fef9ff785badb6d56aecff51b28e6fe6387747f3fa
                                • Instruction ID: db173ce08d5d05250d5dc07aa3e0f950bb64f4599e28ba7c5c74008672822eeb
                                • Opcode Fuzzy Hash: a5b347c5628a259a3c6271fef9ff785badb6d56aecff51b28e6fe6387747f3fa
                                • Instruction Fuzzy Hash: 7221F2B1D003499FDB10DFAAC880BEEBBB5FF48210F14842AE959A7240C77999448BA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 266 5fd9dd0-5fd9e1b 268 5fd9e1d-5fd9e29 266->268 269 5fd9e2b-5fd9e5b Wow64SetThreadContext 266->269 268->269 271 5fd9e5d-5fd9e63 269->271 272 5fd9e64-5fd9e94 269->272 271->272
                                APIs
                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05FD9E4E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: ContextThreadWow64
                                • String ID:
                                • API String ID: 983334009-0
                                • Opcode ID: e1a4405bf49c1afcfdde95c6360104b0b08a9ea574334f8025110657ce33d7d6
                                • Instruction ID: 507d640e26c9cb56be73d78129de5b6df86638a4fde34abb04c2c6ec30bca281
                                • Opcode Fuzzy Hash: e1a4405bf49c1afcfdde95c6360104b0b08a9ea574334f8025110657ce33d7d6
                                • Instruction Fuzzy Hash: 99213571D003098FDB20DFAAC484BEEFBF5EF48220F14842AD419A7240CB78A945CFA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 284 2d7a228-2d7b700 286 2d7b702-2d7b705 284->286 287 2d7b708-2d7b737 LoadLibraryExW 284->287 286->287 288 2d7b740-2d7b75d 287->288 289 2d7b739-2d7b73f 287->289 289->288
                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D7B119,00000800,00000000,00000000), ref: 02D7B72A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1251620380.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2d70000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: daed3ef01ba7f977f6162b2fe57921d07e194443722869035a2d25bed024b8f9
                                • Instruction ID: 2a99f31970a47c3ac5870480e5ad0b740bedb373a0704a4517d02856b30065ae
                                • Opcode Fuzzy Hash: daed3ef01ba7f977f6162b2fe57921d07e194443722869035a2d25bed024b8f9
                                • Instruction Fuzzy Hash: 471103B69003098FDB20DF9AD444BEEFBF4EB48314F10842AE959A7300D379A945CFA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 292 5fda2d8-5fda35b VirtualAllocEx 295 5fda35d-5fda363 292->295 296 5fda364-5fda389 292->296 295->296
                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05FDA34E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: f9b49f957a08c5d3735f67e7f7d40d0875bb4c60791639dab2297dbc114050bd
                                • Instruction ID: 57a35823edcd60b8e86c51af50554f617e72b814a8f28d1e63ac14abbc45644c
                                • Opcode Fuzzy Hash: f9b49f957a08c5d3735f67e7f7d40d0875bb4c60791639dab2297dbc114050bd
                                • Instruction Fuzzy Hash: D8114776D003488FDB20DFAAD844BDEBBF6EF48314F288419E959A7250C77A9541CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D7B119,00000800,00000000,00000000), ref: 02D7B72A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1251620380.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2d70000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 563c0bd7d8e52aaa2a77ae457aa807c69c1ad849fbe2ed7cca1f13195e1745b8
                                • Instruction ID: 6b673e2eeb7d9f7ebe8e8edbf1024716b8eec5abe335df0dead28d7a61111a80
                                • Opcode Fuzzy Hash: 563c0bd7d8e52aaa2a77ae457aa807c69c1ad849fbe2ed7cca1f13195e1745b8
                                • Instruction Fuzzy Hash: 4C11E4B69003099FDB14CF9AD444BDEFBF8EB48314F14842AE559A7300C379A945CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05FDA34E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: d5ce520d114289457b11a6c1e4db1317a3a9294df9b89a949aa2e773c776c4a4
                                • Instruction ID: 06af2f22519001a868e0ed51a29a7c52c04a5b6c8a6ba48a2e1b6665dae48abd
                                • Opcode Fuzzy Hash: d5ce520d114289457b11a6c1e4db1317a3a9294df9b89a949aa2e773c776c4a4
                                • Instruction Fuzzy Hash: 5D112975D003499FDB20DFAAC844BDEFBF6EF48310F248419E955A7250C77A9544CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: ResumeThread
                                • String ID:
                                • API String ID: 947044025-0
                                • Opcode ID: 712a953c9a14ae5830eca23496754b6bc292a48373f4b052d70a11d3706f89b7
                                • Instruction ID: 273726c0946c17966200b36f54e955fe42f70771d95c035111880e0229a712ec
                                • Opcode Fuzzy Hash: 712a953c9a14ae5830eca23496754b6bc292a48373f4b052d70a11d3706f89b7
                                • Instruction Fuzzy Hash: A1116AB1D043488FDB20DFAAC4447EEFBF5EF88320F248419D819A7244CB79A945CBA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,05FDE891,?,?), ref: 05FDEA38
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: ChangeCloseFindNotification
                                • String ID:
                                • API String ID: 2591292051-0
                                • Opcode ID: 062273be3ff3f44d72227c21670f518be425d0a4232641d0659eed388b17b1e0
                                • Instruction ID: 1c33dd5cecbb196215cc89f9198f8968298d0bec8deb016c205dfad73e6e1751
                                • Opcode Fuzzy Hash: 062273be3ff3f44d72227c21670f518be425d0a4232641d0659eed388b17b1e0
                                • Instruction Fuzzy Hash: 071128B68003498FCB10DF9AC445BDEFBF9EB48320F248419E959A7240D379A944CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: ResumeThread
                                • String ID:
                                • API String ID: 947044025-0
                                • Opcode ID: 9ca52cbfe63a0f9aa2178873a076aa4d9c2fe24ef19fbce042470f636eb4f716
                                • Instruction ID: 8618bddee61dba0382f398fd3b233ebe3fa2648de67a2cb42127dac45e941b7e
                                • Opcode Fuzzy Hash: 9ca52cbfe63a0f9aa2178873a076aa4d9c2fe24ef19fbce042470f636eb4f716
                                • Instruction Fuzzy Hash: FD1136B1D003488FDB24DFAAC4447EEFBF5EF88324F248419D459A7244CB79A944CBA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 02D7B09E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1251620380.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2d70000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 847071b8cb62436f34bc2f3adb432c396144b943e889a1c007a51dba3aa6181d
                                • Instruction ID: 19e91eed42e03eaa43db2215378ee419b3529f4a095e70efe1b5a9ee65ca81c4
                                • Opcode Fuzzy Hash: 847071b8cb62436f34bc2f3adb432c396144b943e889a1c007a51dba3aa6181d
                                • Instruction Fuzzy Hash: 1F11FDB6D002498BCB20CF9AC444BDEFBF4AB88314F20842AD829A7200D379A545CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 05FDD345
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: 42ab6f58fc5bf66eaabbdcc8c3d7c0077fc0afb853d1ade32dd29bf1dc13b158
                                • Instruction ID: 565c590fd7554bc8aa95e8ea1d72ddbad06f2912d46f6a586c9dd4524760e540
                                • Opcode Fuzzy Hash: 42ab6f58fc5bf66eaabbdcc8c3d7c0077fc0afb853d1ade32dd29bf1dc13b158
                                • Instruction Fuzzy Hash: 4C1106B5804349DFDB10DF9AC485BDEFBF8EB48310F148419E959A7200C379A944CFA5
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,05FDE891,?,?), ref: 05FDEA38
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: ChangeCloseFindNotification
                                • String ID:
                                • API String ID: 2591292051-0
                                • Opcode ID: 072169ddc0c15223617b5dfe122ca932c626c7f9245e7a846cc983972dfcfb59
                                • Instruction ID: 0dc4099b8c3a5c947e7d26a1625690bfdee0dd00aedc2b0a3e6d30546db32111
                                • Opcode Fuzzy Hash: 072169ddc0c15223617b5dfe122ca932c626c7f9245e7a846cc983972dfcfb59
                                • Instruction Fuzzy Hash: 511125B5800309CFCB20DF9AD1447DEFBF5EB48320F24841AD958A7240C338A544CFA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                APIs
                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 05FDD345
                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID: MessagePost
                                • String ID:
                                • API String ID: 410705778-0
                                • Opcode ID: 3b8541b0642f1c78d419c4e1a2768ae7841a4d3a848c002203e61b70456808e4
                                • Instruction ID: 1e54ff6fdf0c6fd8d1a578b949707105850baeb4f296ae6bf393a51dce7d35d1
                                • Opcode Fuzzy Hash: 3b8541b0642f1c78d419c4e1a2768ae7841a4d3a848c002203e61b70456808e4
                                • Instruction Fuzzy Hash: E611F2B6800349CFDB10CF99D884BDEFBF8EB48310F24841AE919A7600C379A544CFA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1250132164.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10fd000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bedc363f07ef16ae4a7c86f42e7a30683cf193264a2b5f04e9867446073d1385
                                • Instruction ID: 680ecc054375855c50b239f8db1e764a95a77baa50b9e762cb6a16f65f35a860
                                • Opcode Fuzzy Hash: bedc363f07ef16ae4a7c86f42e7a30683cf193264a2b5f04e9867446073d1385
                                • Instruction Fuzzy Hash: ED216AB1500240DFDB05DF54D8C5B2ABFA1FB84718F24C1ADDA450B646C336D446CBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1250132164.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10fd000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4587a0d3766a74da93b446e556db4347fa6b6a70d1949a23a3578681d380493f
                                • Instruction ID: 6925727d9d4692603df1d00dca921a1aa53002fcbdeb5b53496454d1d2016b8b
                                • Opcode Fuzzy Hash: 4587a0d3766a74da93b446e556db4347fa6b6a70d1949a23a3578681d380493f
                                • Instruction Fuzzy Hash: BA2148B1500204DFDB05DF44C9C1B5ABBA5FB84324F24C1ADEA4A0B646C73AF446CBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1250537918.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_110d000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a241f92d848990864c075116b3d361a633d78ff7a3a7926b50e8a00a93f0593c
                                • Instruction ID: 14d196b0e70e73e808712af9c90591c4cbdaf157972d9fcff104bfb98716e570
                                • Opcode Fuzzy Hash: a241f92d848990864c075116b3d361a633d78ff7a3a7926b50e8a00a93f0593c
                                • Instruction Fuzzy Hash: 5D212971904304EFDF0ADFD4E5C0B25BBA5FB84324F24C56DE90A4B296C3B6D446CA62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1250537918.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_110d000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 02fa1c8b108432dbac9e4c37de91944ed8d581c4922ca5de1c2871d6df5a5e92
                                • Instruction ID: 56ef6ca504c0d89c68423ccedd957926d3eb58b67a8e03d672d78e63d30d2423
                                • Opcode Fuzzy Hash: 02fa1c8b108432dbac9e4c37de91944ed8d581c4922ca5de1c2871d6df5a5e92
                                • Instruction Fuzzy Hash: A4212571A04304DFDF1ADF94E880B16BB65EB84314F24C56DD80E4B28AC3B7D447CA62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1250132164.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10fd000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                • Instruction ID: a9246a4d76db78df252d66be36ae8a2360c983e0417b604ec9e6b99a9f373188
                                • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                • Instruction Fuzzy Hash: 1511CD76404240CFDB12CF44D5C0B56BFB1FB84224F2482A9D9490AA56C33AE456CBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1250132164.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10fd000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                • Instruction ID: 8115383f01a55fd0ea7e0025a349573ba91b2300e30e8ba3a5a9e107e8b1b291
                                • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                                • Instruction Fuzzy Hash: 6F11DF76404280CFCB12CF54D5C4B16BFB1FB84714F24C6ADD9490B656C33AD45ACBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1250537918.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_110d000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                • Instruction ID: 2423b67bcf1bc35b7d1ad4828d04776e51dc9b7d80c2e83c6bd42dcaa2ce6f0f
                                • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                • Instruction Fuzzy Hash: C211BE75904280CFDB16CF54E5C4B15BB61FB44314F24C6AAD8494B69AC37AD40ACB62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1250537918.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_110d000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                • Instruction ID: 6d890a7f4355ba242869e924685af5bfe9848de60876bc8546a073e05759f1de
                                • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                                • Instruction Fuzzy Hash: 6411BB75904280DFDB16CF98D5C0B15BBB1FB84224F28C6AAD8494B696C37AD40ACB62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1250132164.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10fd000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: bbef0eaa56d28f5b6ea359bc51b127ff5abff53df23274566afa9f399a4ed4c4
                                • Instruction ID: ec08686c4144df8ebecb9b0f077e31db47660cbded29ffad3fe012dab776c365
                                • Opcode Fuzzy Hash: bbef0eaa56d28f5b6ea359bc51b127ff5abff53df23274566afa9f399a4ed4c4
                                • Instruction Fuzzy Hash: 1D01F7711043809BE7205E95CD84B6ABBD8FF42264F18C55EEF890E686E2799440CB72
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1250132164.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10fd000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1999ed16fc1c8c82a4a8d842acf64f8a880691d46e2b193e9089e9cd71ee2288
                                • Instruction ID: 060cfc5ab51e577735c7a88c32c38369da89e94443f062fa7c7735405e83ddfc
                                • Opcode Fuzzy Hash: 1999ed16fc1c8c82a4a8d842acf64f8a880691d46e2b193e9089e9cd71ee2288
                                • Instruction Fuzzy Hash: 81F0C2714043809EE7208E1AC8C4B66FFD8FB81234F18C55AEE880F697D2799844CBB1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 084c7110f66794d825ffe4438435c1e3a4dda6817de97f5468d2c8c082c09558
                                • Instruction ID: 88caddc0a22b5d9511dde8b84f9bbd7306b66d9ff4c2fbb3c0d88a5f91dc1e03
                                • Opcode Fuzzy Hash: 084c7110f66794d825ffe4438435c1e3a4dda6817de97f5468d2c8c082c09558
                                • Instruction Fuzzy Hash: 61E11574E04219CFDB14DFA9C680AAEFBB2BF89304F2481A9D414AB355D775AD41CFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fa38b8f76742a96b29a2003c4c87495afd6c57f94ebe5d48dbc16ae31cb8748e
                                • Instruction ID: 57a06c1a17e60113f4425d1b975c397fb9e6f32dc02bb4f9fa0adc2f44432071
                                • Opcode Fuzzy Hash: fa38b8f76742a96b29a2003c4c87495afd6c57f94ebe5d48dbc16ae31cb8748e
                                • Instruction Fuzzy Hash: 35E1E474E042198FDB14DFA9C580AAEFBB2FF89304F2481A9D414AB355D735AD41CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 26654eb53b746477ff84863cb0d75b86dae1a2bc22607a2cfede87e59c7a7678
                                • Instruction ID: 85f9e5dbadc9b3a9eb539a8b1ed51ea5b5892d170805510eca6d334feb72f3fa
                                • Opcode Fuzzy Hash: 26654eb53b746477ff84863cb0d75b86dae1a2bc22607a2cfede87e59c7a7678
                                • Instruction Fuzzy Hash: CEE10874E04219CFDB14DFA9C680AAEFBB2BF89304F2481A9D414AB355D774AD41CF60
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e2666fcbaba2bcd0f89de031f044bc544c868159a46235ffde081fab16aed3ea
                                • Instruction ID: 837a9e4930256821d510db9f6e3bd930cceeb2a401fc28e290d5e0dd8520e9bd
                                • Opcode Fuzzy Hash: e2666fcbaba2bcd0f89de031f044bc544c868159a46235ffde081fab16aed3ea
                                • Instruction Fuzzy Hash: D0E13574E04219CFDB14DFA9C580AAEFBB2BF89300F2481AAD454AB355D735AD41CFA4
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f73e00425c8f2a7c9705685a6e8c1ae514f9d5634ed5a2e0f4d19ec4ae084ddf
                                • Instruction ID: c9a06df79059e3d4ddb5b276836cb49a31a1abd370cb157176044227b5b959ea
                                • Opcode Fuzzy Hash: f73e00425c8f2a7c9705685a6e8c1ae514f9d5634ed5a2e0f4d19ec4ae084ddf
                                • Instruction Fuzzy Hash: 9EE10675E002198FDB14DFA9C580AAEFBB2FF89304F2481A9D414AB356D735AD41CF61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 780a08654fb11b10821aaf789b0a7f03b63a92ebe66e04ad8107a09bf5f73a25
                                • Instruction ID: e7fa495aa4bc7d9779429e894233f3f67617f249d885754de7c6e11eeb427dbd
                                • Opcode Fuzzy Hash: 780a08654fb11b10821aaf789b0a7f03b63a92ebe66e04ad8107a09bf5f73a25
                                • Instruction Fuzzy Hash: 5DB16A71B006048FEB25EB75C864B6EB7BBAF89704F18446DD246DB390DB39E901CB61
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1251620380.0000000002D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_2d70000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f62cab460c52cbc723ba48387523669ff3f573f313c845ab72c713e24a7ced91
                                • Instruction ID: 3e846da0e44ed0d7781e39893067dc914140342bae63e283a5d8f7ff0401f9b2
                                • Opcode Fuzzy Hash: f62cab460c52cbc723ba48387523669ff3f573f313c845ab72c713e24a7ced91
                                • Instruction Fuzzy Hash: 7AA15A32E002158FCF25DFA4C8406AEB7B2FF85304B25856AE805AB361EB75ED56CF50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9b1e2d3982c9cd46d1be1cddcd36b33559c144f7ae0c4515987deb3337a9f693
                                • Instruction ID: 2585603dbf425e6c1d3c656f96d72a5ceec9a2f34b7ff890e97f15e6f41b1394
                                • Opcode Fuzzy Hash: 9b1e2d3982c9cd46d1be1cddcd36b33559c144f7ae0c4515987deb3337a9f693
                                • Instruction Fuzzy Hash: 7551E374E051199FCB04DFAAD5849AEFBF6BF88300F18C166D409A7315DB34A942CFA0
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 198327951b6d2d8e92151522037e5d8c75a504b4f17c04acc363e92c6ff9504d
                                • Instruction ID: e4f8ded3f493dfd753d7640b7f82806d2c77edf3f983e1481510e0a34dac4df7
                                • Opcode Fuzzy Hash: 198327951b6d2d8e92151522037e5d8c75a504b4f17c04acc363e92c6ff9504d
                                • Instruction Fuzzy Hash: 3B51E875E042198BDB18DFA9C5806AEFBF3FF89304F2481AAD418AB315D7359941CFA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 134a22a5ae83f3d8b5c112038721ac2e474f24106bae73d90385876b92717c0c
                                • Instruction ID: 4743b25272ca31960e606ddfc34e3d22c9b6bc996236034e67e14a5fd490f3cc
                                • Opcode Fuzzy Hash: 134a22a5ae83f3d8b5c112038721ac2e474f24106bae73d90385876b92717c0c
                                • Instruction Fuzzy Hash: 1441F875E055189FDB08DFAAD9856AEFBF2FF88300F18D02AD408A7354EB349942CB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000000.00000002.1256492007.0000000005FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FD0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_5fd0000_eiQXaKJ75nCjEWn.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f0bfdb8c2627dacdd345a1fd7eb12557706cb783c70cf48f8941ac82f08e0d07
                                • Instruction ID: 9af45ff38785f301ffe230b31edd564b3f1e9398483fb879bb59b16f2d9d6641
                                • Opcode Fuzzy Hash: f0bfdb8c2627dacdd345a1fd7eb12557706cb783c70cf48f8941ac82f08e0d07
                                • Instruction Fuzzy Hash: 2611ECB2E116589BEB08CF6BCC0579EFBF7AFC9200F18C079D908A6254EB3406468F51
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1d7d7fa11f54f2b9ef13af0505a2fce0baf54a3240b923e3e913e44e7ee31c8b
                                • Instruction ID: 4f5a5ce042112e8a867fed0067bff346b41f728a19ac71f9c8f8fae0aa45effc
                                • Opcode Fuzzy Hash: 1d7d7fa11f54f2b9ef13af0505a2fce0baf54a3240b923e3e913e44e7ee31c8b
                                • Instruction Fuzzy Hash: 47630831D10B1A8ADB11EF68C8806A9F7B1FF99300F55D79AE45977121EB70AAC4CF81
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8893ce0748c99a0d5f2346b2791e8f9ef7d4eb321368642d7a70c25178fc6823
                                • Instruction ID: 74b00b0bc789937f3c23dd16893c468381ceb3063a70f3cca48fdfae930d12ca
                                • Opcode Fuzzy Hash: 8893ce0748c99a0d5f2346b2791e8f9ef7d4eb321368642d7a70c25178fc6823
                                • Instruction Fuzzy Hash: 2C331C31D107198EDB11EF68C880AADF7B1FF99300F15D79AE459A7211EB70AAC5CB81
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID: \V{m
                                • API String ID: 0-929464540
                                • Opcode ID: ea6b33671bbf2264ce88d142043b937aa5979ca15966a221e0ef1f34124ac771
                                • Instruction ID: 4ccfc757f83e17e53d6a293efb193e4d042b2e5163e3e1cd0d69748239daa79b
                                • Opcode Fuzzy Hash: ea6b33671bbf2264ce88d142043b937aa5979ca15966a221e0ef1f34124ac771
                                • Instruction Fuzzy Hash: 7E918F70E00219DFDF14DFA9D9857DEBBF2BF48718F248129E405A7254EB789886CB81
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 94e2f3a13d46b84239d3518463d0e0b7efd39d92d583d0e6b878947231baf6ad
                                • Instruction ID: 3c6d58c543bfd73ce98405885282c8d2734795dad559f95ad3202468e489bd00
                                • Opcode Fuzzy Hash: 94e2f3a13d46b84239d3518463d0e0b7efd39d92d583d0e6b878947231baf6ad
                                • Instruction Fuzzy Hash: 2C327034A002248FDB15EF69D4847ADBBB2FF88318F248569E906EB395DB71EC45CB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5342bbcfd7e6b34b3c4afe1da620b9ca6cf313f4970fd24acca76ba3606fb3be
                                • Instruction ID: 1775db970ab20bedaa4171bc2e1f8ba2af23799b958fa4a0ea4c2f1480a3fa0d
                                • Opcode Fuzzy Hash: 5342bbcfd7e6b34b3c4afe1da620b9ca6cf313f4970fd24acca76ba3606fb3be
                                • Instruction Fuzzy Hash: E4B17D70E002299FDF14DFADD8817ADBBF2BF88358F148129D815E7294EB749885CB81
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID: \V{m$\V{m
                                • API String ID: 0-2571113180
                                • Opcode ID: 1c56142ab2a306ed44681e575f10bec76a913c0a293269e52cd834ddce517e12
                                • Instruction ID: bbab0fb81b4abebe0df7352963152f38a7b9fd28e7ddcda0fc3ce59225875b1d
                                • Opcode Fuzzy Hash: 1c56142ab2a306ed44681e575f10bec76a913c0a293269e52cd834ddce517e12
                                • Instruction Fuzzy Hash: 50718D70E00259CFEB14EFA9D88079EBFF2BF88718F148129E415A7254EB749846CB95
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID: \V{m$\V{m
                                • API String ID: 0-2571113180
                                • Opcode ID: b0d7c4a2bb494c3041eb2c2f23c27de9467948b5c14c70c5bf241f0b416218f5
                                • Instruction ID: ebc3c8b2b0223e1b69317c7ad987c5552291e02dbb03ab382f43e8e5b446d6c3
                                • Opcode Fuzzy Hash: b0d7c4a2bb494c3041eb2c2f23c27de9467948b5c14c70c5bf241f0b416218f5
                                • Instruction Fuzzy Hash: BC718CB0E00259CFEB14DFA9D8807DEBFF2BF48718F148129E415A7254EB749846CB95
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Strings
                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID: \V{m
                                • API String ID: 0-929464540
                                • Opcode ID: c1620cbb41fc6a17fd6e2aad34ecd4596ff10f9d2c8e07786987c815bd19d8da
                                • Instruction ID: 7321177002e08b089023495dd902262d999fb9d34a041e445389f0b4449c6d92
                                • Opcode Fuzzy Hash: c1620cbb41fc6a17fd6e2aad34ecd4596ff10f9d2c8e07786987c815bd19d8da
                                • Instruction Fuzzy Hash: ED918F70E00219DFDB10DFA9D985BDDBBF2BF48718F248129E415A7254EB789886CB81
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 30d2a5901983eb0cffbfcca74825bc0664ce220d23c7add7b949f872f7c6dcc8
                                • Instruction ID: 6012b4c09869c59d521a0b231ab4282cf29365374f03caa0f6023b0ad307620c
                                • Opcode Fuzzy Hash: 30d2a5901983eb0cffbfcca74825bc0664ce220d23c7add7b949f872f7c6dcc8
                                • Instruction Fuzzy Hash: F91284317006019BDB16B738E89422D33A7FB8A359B608D7AE006CB755CF75DC8ADB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 21e03c527f89d8bd8c43f21b0b0791aa5b9f38782fceab6ebb00f9b985aa6e67
                                • Instruction ID: 4afdd8af224bb0d2bd770dfc12dece8c512fd0e350f315bd2cc223b3289cfa95
                                • Opcode Fuzzy Hash: 21e03c527f89d8bd8c43f21b0b0791aa5b9f38782fceab6ebb00f9b985aa6e67
                                • Instruction Fuzzy Hash: D9B17B70E002299FDF11DFADD8857DDBBF2BF48358F248129D814AB294EB749885CB81
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cb8bb2bbc50886be6bc8d304dd3b73ceddfc46a1962d7167a18c1d3adac64e54
                                • Instruction ID: bd84af55449817e292646554a68e502d603e17aec875b469ca9ca5738c8c6364
                                • Opcode Fuzzy Hash: cb8bb2bbc50886be6bc8d304dd3b73ceddfc46a1962d7167a18c1d3adac64e54
                                • Instruction Fuzzy Hash: DB916F34A002248FDB15EB68D584BADBBF2FF88318F148569E906E7365CB31EC46CB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fe26d8ff6a9382ebd971df58a36d173cf25eec6e9e0e93ee586757e61815cd62
                                • Instruction ID: 8970f34f87de7a048bbfcf6822de90462e27ff3da435dd1c96a5a429bf879ddc
                                • Opcode Fuzzy Hash: fe26d8ff6a9382ebd971df58a36d173cf25eec6e9e0e93ee586757e61815cd62
                                • Instruction Fuzzy Hash: FB51C730E002559FDB15EB78C4517AEBBB2FF8A304F2084AAE405EB351DB759C4ACB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a878b7505f92dd4acb5a113c731f57f1aa4593742e352bb492b8d578e0e86fce
                                • Instruction ID: f44803247973704c731d4598f7ba1428d970febbac92379652f347b02551d697
                                • Opcode Fuzzy Hash: a878b7505f92dd4acb5a113c731f57f1aa4593742e352bb492b8d578e0e86fce
                                • Instruction Fuzzy Hash: 0E5124B0D00228CFDB18DFA9C885B9DBBB1BF48314F54812AE819AB351D774A844CF95
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c1dfd2bcc49976ea152f1f8b184b8a332a810b3bde017bbee9f95819e624e121
                                • Instruction ID: 6df15a50f54e8fe9916d214385efd9667b25286b3efb3a8a9603268dd061ce4d
                                • Opcode Fuzzy Hash: c1dfd2bcc49976ea152f1f8b184b8a332a810b3bde017bbee9f95819e624e121
                                • Instruction Fuzzy Hash: 175125B4D00228CFDB18DFA9C885B9DBBB1BF48314F54812AD819BB351D774A845CF95
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4035ccf2efd49a94b784671df8e99734b2ce9950becc95d97d137bb3ba2bfecc
                                • Instruction ID: 333f476fc462eac19079f16c8c04bc26a5ed931c9cf63d511a1385528c5daaef
                                • Opcode Fuzzy Hash: 4035ccf2efd49a94b784671df8e99734b2ce9950becc95d97d137bb3ba2bfecc
                                • Instruction Fuzzy Hash: 18517E76911A868FD706FB2DFA81A4A3B72B74730534089ACD1854B37ADB706C85CF92
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c01a370808239551c525b34e2b20810e1554e79db16f2fc9e4077d7e66a9a3df
                                • Instruction ID: 94330179962f2b301be0e71f2d0ffd2ca254c9661b6d455ec94de2fb656cdccd
                                • Opcode Fuzzy Hash: c01a370808239551c525b34e2b20810e1554e79db16f2fc9e4077d7e66a9a3df
                                • Instruction Fuzzy Hash: 2D511271D003198FEB24DFA9C884BDEBBF1EF48314F248029E419AB254DB759946CB90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: eb3288b4564f513c558c78c4702cfe598411dc0374354644d0bcb0643f5b46e5
                                • Instruction ID: 003b6b5a494efda6f25cc742725baf6bd82f9fbaa16f73f66ee41d2a29abbae2
                                • Opcode Fuzzy Hash: eb3288b4564f513c558c78c4702cfe598411dc0374354644d0bcb0643f5b46e5
                                • Instruction Fuzzy Hash: 75512836A11A468FD706FB2DFA80A4A3B76B797301340896CD1854B37ADB707D85CF92
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1c4c60c7b0e896e4a402bab71ab90976c4c505d9b5e3350c357ed8da059d5c23
                                • Instruction ID: 45f004998c4b4bcdc66d8281067fc72fc04218cbeff95a747884a0ea4e6a4ac4
                                • Opcode Fuzzy Hash: 1c4c60c7b0e896e4a402bab71ab90976c4c505d9b5e3350c357ed8da059d5c23
                                • Instruction Fuzzy Hash: 9531F2307002158FDB16AB38D4147AE7BB6AF89618F24456CD402EB396EF76CC4ACB90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9bbd7c6a74d6100762b923c28b6b3ba9b80172a6ee4b4627f8eade4437b67039
                                • Instruction ID: 914ed9720eb23024fea34009c0401ba5aa806f0eae8fcf2566f25d597df5527a
                                • Opcode Fuzzy Hash: 9bbd7c6a74d6100762b923c28b6b3ba9b80172a6ee4b4627f8eade4437b67039
                                • Instruction Fuzzy Hash: EF317274E002398BDF25AEADD98077EBB66FB85318F20442AD51AD7381DA35DC81C791
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2ee7884a7176c0936b1a12cf620a062ad1c6a4f733c341903a3c6a864ccc3195
                                • Instruction ID: 420990e3f3ff27be6e4cf0a9b1e322561d362ea248161009254cbd71ddc03097
                                • Opcode Fuzzy Hash: 2ee7884a7176c0936b1a12cf620a062ad1c6a4f733c341903a3c6a864ccc3195
                                • Instruction Fuzzy Hash: 1B31EF307002198FDB19AB38D81476E7BBAAF89608F60446CD006EB396EF75DC49C7A1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 64cdfd26c53b67333ae0182d5cc5c889f3c0e091dc8e1dbbbed8eb8e266fe9ae
                                • Instruction ID: d38b910c2732469a27abf9c872a4b9d0aed466b2750dc36db8a9877cafd1e391
                                • Opcode Fuzzy Hash: 64cdfd26c53b67333ae0182d5cc5c889f3c0e091dc8e1dbbbed8eb8e266fe9ae
                                • Instruction Fuzzy Hash: E0319E35E006159FDB19DFA8D89469EBBB6FF89304F108559E806E7341EF70AC46CB40
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c72ee1865d464952e65db593d9642448acfe2900b62f1b33973fbe74c3ba923e
                                • Instruction ID: 0afdaa2b15076d9948f32da734809d1a2c38a9748e68417981b6c15d8bfd6fc4
                                • Opcode Fuzzy Hash: c72ee1865d464952e65db593d9642448acfe2900b62f1b33973fbe74c3ba923e
                                • Instruction Fuzzy Hash: CE318135E102199FDF15DFA9D4507AEB7B2FF89304F20856AE801E7241EB759949CB40
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c300bcaa99876dd31c83e04c527c615aedb208cc9a695b820ccef684e2e87570
                                • Instruction ID: ff83fb767a926010c1ee09e542ecc882246c4ac29c9a145b34b2a46aa27ed4fa
                                • Opcode Fuzzy Hash: c300bcaa99876dd31c83e04c527c615aedb208cc9a695b820ccef684e2e87570
                                • Instruction Fuzzy Hash: 8A314776F006504FDB12BB7CA9447AE7FAAEB8A328F114965D945C7342E771C9028B90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4b9addfa7594edc1117d119fd485df7e8470d5598b6481e34d85b992338d0888
                                • Instruction ID: 94b582657322f987a3ecf9ca04da3f41c32ea3a2bfdf0e57568b8e2b1212eb82
                                • Opcode Fuzzy Hash: 4b9addfa7594edc1117d119fd485df7e8470d5598b6481e34d85b992338d0888
                                • Instruction Fuzzy Hash: B0318F35E106199BCB19DFA9D494A9EBBB6FF89304F108519E806E7340EF70AC41CB40
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b7bf8b5a0defeade7dee55c9f979d7eb2e23770f7e54a9aa73f94a5d4ed1bbc3
                                • Instruction ID: 2c9aba607729788828992a5e1cbd7a3da6d1b2a2c6de10a89dcc33c61bf5bee0
                                • Opcode Fuzzy Hash: b7bf8b5a0defeade7dee55c9f979d7eb2e23770f7e54a9aa73f94a5d4ed1bbc3
                                • Instruction Fuzzy Hash: E941C274D003589FDB14DFA9C884ADEBFB5FF48314F148029E419AB254DB759945CB90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 73e993133aa8de086071d91443e44219efcff1594239fd140a5e3f98fb438700
                                • Instruction ID: f68f335d7d8603797ced6d7c69bd546a50ffb9f94721757434d82b9b313cee2b
                                • Opcode Fuzzy Hash: 73e993133aa8de086071d91443e44219efcff1594239fd140a5e3f98fb438700
                                • Instruction Fuzzy Hash: 6E318631E002299FDB15DFA8D55479EF7B2FF89304F10865AE805EB345DB709846CB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0bfe23c3b4f6f1a66a9b8af396710435121938dc5cfea01405895a79cffda5eb
                                • Instruction ID: 293b7d25656ae841f901fef24d6d4c0123a74b26b7acc9b91b65b94518f5cd94
                                • Opcode Fuzzy Hash: 0bfe23c3b4f6f1a66a9b8af396710435121938dc5cfea01405895a79cffda5eb
                                • Instruction Fuzzy Hash: AF21F7765101504FDF23F73CEA8476D3766EB86318F144965D006CB356EA64DC858FA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8a1e8853a2603acccb1431d2e252e8d45ce6c6df299d11de0dc3935d55477afb
                                • Instruction ID: 6dbc4c369d48fcd2d4cfa016e35fefe18a3bfdbf119b6c8185c9c65bca96f569
                                • Opcode Fuzzy Hash: 8a1e8853a2603acccb1431d2e252e8d45ce6c6df299d11de0dc3935d55477afb
                                • Instruction Fuzzy Hash: F921D171A002118BEB33773CE68432D3776EB4731EF600869E54ADB792DA6488859B92
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e94e1c89c32a2c456ed3fa1bece7a91f14cea41048b870eb3997b6f73d4b6fff
                                • Instruction ID: 9f8c6f1d7fd41f35102d0afccb41628c138e0a581883ad8e34149aecd3a51493
                                • Opcode Fuzzy Hash: e94e1c89c32a2c456ed3fa1bece7a91f14cea41048b870eb3997b6f73d4b6fff
                                • Instruction Fuzzy Hash: 67219131E002299BDB15DFA9D48079EFBB2FF8A308F108619E905EB345DB719845CB90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9bf6f6f00180277976899e3f5b1e60b91a39ab3932b2de99702ce889f8c7d400
                                • Instruction ID: a672db13bbc03d48fd1e1ef131366b2848fb72933d4171e65e089be47f7201c2
                                • Opcode Fuzzy Hash: 9bf6f6f00180277976899e3f5b1e60b91a39ab3932b2de99702ce889f8c7d400
                                • Instruction Fuzzy Hash: F121F8317092908FC706EB7CA4613DE7FB2AF86204B1445EAD089CB357DE395846C781
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4ff778eee8c9dd10399a8e3c71cb88a2fff193b973cedd78caf5fe17311f9681
                                • Instruction ID: e438e7c49de1565742b8e6fefbbf0774fe15defe035ba86c22ed02249f5e7b6b
                                • Opcode Fuzzy Hash: 4ff778eee8c9dd10399a8e3c71cb88a2fff193b973cedd78caf5fe17311f9681
                                • Instruction Fuzzy Hash: B0216D71B00269CFDB65FB68C6597AE7BB2AF89309F10046CC502EB3A5DB358D41CB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2458556118.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_f7d000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4fc049174330589d39c93bbdfdeff2fb1f0be6517c5565450853e16e8dfa6179
                                • Instruction ID: abad743fa9ec3ca2619f92940d9f2969989d8111eac503034adb5268a8d15b5b
                                • Opcode Fuzzy Hash: 4fc049174330589d39c93bbdfdeff2fb1f0be6517c5565450853e16e8dfa6179
                                • Instruction Fuzzy Hash: FE2100B2904204DFDB14DF10D980B26BBB1EF84324F64C56AD80E0A28AC37AD846DA63
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2a37f1b2b9197db0de0b54ed055052f552cc66a5710f6775194de240c29bc343
                                • Instruction ID: 2b6d4a66d79350c8094b5b610cd13ebf171a8edbee82313b08b88883d12b209d
                                • Opcode Fuzzy Hash: 2a37f1b2b9197db0de0b54ed055052f552cc66a5710f6775194de240c29bc343
                                • Instruction Fuzzy Hash: 0B217435E002299BDB19DFA9C8546DEB7B2EF89318F20851AEC15F7341EB70E945CB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4ceefa684952cde90bd38b011321f562ff692d849eb92884affb23a0d77e3f1f
                                • Instruction ID: d0d0824a30184765f44977fb8c47057dc6c52ac9f29a9da95ab5cc33ab4b003b
                                • Opcode Fuzzy Hash: 4ceefa684952cde90bd38b011321f562ff692d849eb92884affb23a0d77e3f1f
                                • Instruction Fuzzy Hash: 18212635A00219CFDB54EB78DA58BAD7BF1AF89304B1044A8E406EB360DB359D05DB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2458556118.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_f7d000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c359f2b499d994f60f90348f1b1d8565b387b2e9e6593c33e67b89aa9b7fcd85
                                • Instruction ID: 1b40622b79a9c5a74ade4b7c799bc0a1e4515fc4a2429bee9876043b3690f24f
                                • Opcode Fuzzy Hash: c359f2b499d994f60f90348f1b1d8565b387b2e9e6593c33e67b89aa9b7fcd85
                                • Instruction Fuzzy Hash: CF215E7150D3C09FC703CB24D990711BF71AF46224F29C5EBD8898F2A7C23A980ACB62
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6e4ff6ba4e03aa1d24da4abdd2f6b5b85b5a5f88e00222c5aebad6c79adeead5
                                • Instruction ID: a79206c69ede3d2498bc51014d492d01164e9ba5e2a7f3f8ff2000e2f8c99a74
                                • Opcode Fuzzy Hash: 6e4ff6ba4e03aa1d24da4abdd2f6b5b85b5a5f88e00222c5aebad6c79adeead5
                                • Instruction Fuzzy Hash: 22217231E002659FDB26BFBC95542AE7BF5EF58219F240479D449E7301D735C8428B91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 31a542b5308fef12108bce573d3c8b221fada64bcc68a8e26f747ab4088093db
                                • Instruction ID: 847932eec1ad6bc47f2dc43d18611d63100b8f82e3b9f12007bfd51f1325618d
                                • Opcode Fuzzy Hash: 31a542b5308fef12108bce573d3c8b221fada64bcc68a8e26f747ab4088093db
                                • Instruction Fuzzy Hash: A721A431B002258FEB14EB69C854BAE7BF5FF88718F108065E505EB3A1DA71DC00CB90
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 70518f35e665e57da9a7a1e863e0e93f8d015cac0bcfdc62df36602e4bad11a3
                                • Instruction ID: 640395a3f637b43e39adf0e861583c26ab0e6dfb3523397a953df0f3cfe2e640
                                • Opcode Fuzzy Hash: 70518f35e665e57da9a7a1e863e0e93f8d015cac0bcfdc62df36602e4bad11a3
                                • Instruction Fuzzy Hash: 37216534E002299BDB19DFA9C85469EF7B6EF89308F20851AEC15F7341EB70E845CB50
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 42355793ec4fed7c54e6b46e978067b4add75de2d334c048a213915265e6e44a
                                • Instruction ID: 326bf64f781e842f235f82443f18738d68e3452f79f512b21bcf1fd8a269aa65
                                • Opcode Fuzzy Hash: 42355793ec4fed7c54e6b46e978067b4add75de2d334c048a213915265e6e44a
                                • Instruction Fuzzy Hash: 80210C31B00269CFDB54FF68C6547AE77F6AB49209F100468C506EB354DB759D41CBA2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 740ad94cca4c0c93b5cde820b3e300e21c74c41ba0aa72984ef727a5bc7ea420
                                • Instruction ID: e44d8deaed712466fba1d0a7a49bd7db79b13986219b363a08e261ef07f8bad3
                                • Opcode Fuzzy Hash: 740ad94cca4c0c93b5cde820b3e300e21c74c41ba0aa72984ef727a5bc7ea420
                                • Instruction Fuzzy Hash: 062163756106104FEF23F72CEA8475A376AE78A318F504925D406C7356EB74DC858F91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 301c9049c8496f862dd34a3081e7b87994a872493baf1477cfa066cb2452a29d
                                • Instruction ID: 544e94740633d6ae1d2ca432c51ef0ed2aa49f96cc8cab337d7f71dfa97977b4
                                • Opcode Fuzzy Hash: 301c9049c8496f862dd34a3081e7b87994a872493baf1477cfa066cb2452a29d
                                • Instruction Fuzzy Hash: B221F831B00219CFDB54EB79D958BAD77F1AF89308B2044A8E506EB3A0DB75DD04DB91
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2b6583e6e7f4e27b3beed95672fedbc01965386ffbccb01621f4f074a2747819
                                • Instruction ID: 813fa10134013151e906bd0a918d866745691bbd91715aebca0b735943568b49
                                • Opcode Fuzzy Hash: 2b6583e6e7f4e27b3beed95672fedbc01965386ffbccb01621f4f074a2747819
                                • Instruction Fuzzy Hash: B5119835B002288BEF19BA7DD44476B3696EB86658F204839F157CF346DA61CC894BD1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cc9b1be65c7562f13c28587c9a22430af9b624ce2d6a52b32bde604fe6098b5b
                                • Instruction ID: 2dc443bb420a4c332ad1d2940aa88f79e6ada8690be24d3716727f8bd4ac39f6
                                • Opcode Fuzzy Hash: cc9b1be65c7562f13c28587c9a22430af9b624ce2d6a52b32bde604fe6098b5b
                                • Instruction Fuzzy Hash: 7711E731B043258BEF2A767CD91476B3B65DB8221CF10482AF056CF242DA65C8898BC1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 980a639e5b96c2bd9f0f3193098a49be988bd5ebdcbda0e21b27b0f50a613fe8
                                • Instruction ID: 134a8b34656cfe09a8138788ad85ea748e868ae8a6a43f5c70b643989e53fccd
                                • Opcode Fuzzy Hash: 980a639e5b96c2bd9f0f3193098a49be988bd5ebdcbda0e21b27b0f50a613fe8
                                • Instruction Fuzzy Hash: 0F018031E002259FCF25FFBC85506AE7BF5EB58214B24047AD809E7301E735C9458BE1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d1b9a992695350dd39dbbf1bb3692a1920386395364c37c95eafcef86ca002ae
                                • Instruction ID: bb77f72ca71d0b6eaa8a5eebff1ebf9dd21b400ca5631d909725c14d25428212
                                • Opcode Fuzzy Hash: d1b9a992695350dd39dbbf1bb3692a1920386395364c37c95eafcef86ca002ae
                                • Instruction Fuzzy Hash: CA01D830A102048BDB10EF59D94578ABB65FF85314F64C174DC4C5F296EBB0ED45CBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f0e13d8300e70da87339d61f8ea684ddf992c454547964e6cd6b527ad7e5332f
                                • Instruction ID: 8d347641d84ac3ce449744c3b0ed2460b4eac71be15776830e04a0877617e26b
                                • Opcode Fuzzy Hash: f0e13d8300e70da87339d61f8ea684ddf992c454547964e6cd6b527ad7e5332f
                                • Instruction Fuzzy Hash: 9DF02B3274C3A449EB2A367C54642697E419FC2278B451AADD2B5DB1B3D014855CD3D1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e22b40ca8e4672d1bb30cc9cb296d3c912e1420b7a6c988372e6b83d206aa766
                                • Instruction ID: 3baec6fd5e7c71ef696cadcc9ddd2d57fd6d1eec17b6529250f839fabe31b986
                                • Opcode Fuzzy Hash: e22b40ca8e4672d1bb30cc9cb296d3c912e1420b7a6c988372e6b83d206aa766
                                • Instruction Fuzzy Hash: 7401A271910208AFDF11FBB8FA8169D7FB2EF46300F508279C4419B245DE311E49DBA1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a9f5c282934c9e003464267da93a3a60ee83806c7dfc123bd2a1298eb7cbbd18
                                • Instruction ID: c95b4f69c79228f9837f101f468d257f77a0fa89eebf6ed5f6cc87016c752409
                                • Opcode Fuzzy Hash: a9f5c282934c9e003464267da93a3a60ee83806c7dfc123bd2a1298eb7cbbd18
                                • Instruction Fuzzy Hash: 0BF01439B401088FC714EB68D598BAD77B2FF88351F6044A8E5069B3A0DF34AD42CB40
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Memory Dump Source
                                • Source File: 00000005.00000002.2459448466.0000000001320000.00000040.00000800.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_1320000_MSBuild.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: abbd3797892453053ca9ddff9f7e2ffc07ffc642c050b2178d8e05b3da77045d
                                • Instruction ID: a0767c38f6804a924a9faec7b93ea9a831483abcc699bd19270126c0609b5482
                                • Opcode Fuzzy Hash: abbd3797892453053ca9ddff9f7e2ffc07ffc642c050b2178d8e05b3da77045d
                                • Instruction Fuzzy Hash: 80F0AF70910208AFCB00FFB8FA8169C7BB6EF85300F608268C4059B245EE712E48DBA1
                                Uniqueness

                                Uniqueness Score: -1.00%